input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137584697 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 58224,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "239.191.10.49",
"serverIP": "218.251.86.166",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=218.251.86.166 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=239.191.10.49 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=239.191.10.49 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137584697
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 58224
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 239.191.10.49
serverIP: 218.251.86.166
userName: - | Explain this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:164.52.25.251",
"AttackGroup:Forceful Browsing"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0\" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675137584697 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/favicon.ico",
"clientport": 58224,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "79.133.32.16",
"serverIP": "243.240.236.99",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jan 30 21:59:44 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=243.240.236.99 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=79.133.32.16 spt=58224 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jan 30 2023 21:59:44 rt=1675137584697 request=/favicon.ico requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0" dvchost=WAFirewall externalId=18605fb0e39-4bfa8c61 cn2=58224 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=79.133.32.16 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:164.52.25.251', 'AttackGroup:Forceful Browsing']
productids: [0]
sourceinfo: unknown
localstarttime: 1675137584697
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /favicon.ico
clientport: 58224
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 79.133.32.16
serverIP: 243.240.236.99
userName: - | Explain this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 57202,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1708546833611 ",
"message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:185.224.128.55"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "115.105.241.174",
"serverIP": "114.84.233.17",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=114.84.233.17 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=115.105.241.174 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=115.105.241.174 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57202
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1708546833611
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55']
vendorcode: 342
streamName: barracuda_waf
clientIP: 115.105.241.174
serverIP: 114.84.233.17
userName: - | Explain this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 57202,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1708546833611 ",
"message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:185.224.128.55"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "225.2.34.102",
"serverIP": "149.173.242.254",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=149.173.242.254 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=225.2.34.102 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=225.2.34.102 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57202
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1708546833611
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55']
vendorcode: 342
streamName: barracuda_waf
clientIP: 225.2.34.102
serverIP: 149.173.242.254
userName: - | Explain this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 57202,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1708546833611 ",
"message": "<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext=\"-\" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46\" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"GEO_IP_BLOCK",
"ProxyIP:185.224.128.55"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "180.52.96.146",
"serverIP": "77.3.209.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 21 14:20:33 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=77.3.209.34 dpt=80 act=DENY msg=[GeoIP Policy Match] duser="-" src=180.52.96.146 spt=57202 requestMethod=GET app=HTTP requestContext="-" start=Feb 21 2024 14:20:33 rt=1708546833611 request=/ requestClientApplication="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46" dvchost=WAFirewall externalId=18dcd53bccb-18fc2463 cn2=57202 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=180.52.96.146 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 57202
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1708546833611
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 80
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'GEO_IP_BLOCK', 'ProxyIP:185.224.128.55']
vendorcode: 342
streamName: barracuda_waf
clientIP: 180.52.96.146
serverIP: 77.3.209.34
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"223.57.146.57\",\"externalIp\":\"223.57.146.57\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "223.57.146.57",
"serverIP": "215.124.225.21",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"223.57.146.57","externalIp":"223.57.146.57","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=223.57.146.57 ::: serverIP=223.57.146.57 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 223.57.146.57
serverIP: 215.124.225.21
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"78.218.238.78\",\"externalIp\":\"78.218.238.78\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "78.218.238.78",
"serverIP": "147.129.72.94",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"78.218.238.78","externalIp":"78.218.238.78","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=78.218.238.78 ::: serverIP=78.218.238.78 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 78.218.238.78
serverIP: 147.129.72.94
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"177.177.58.251\",\"externalIp\":\"177.177.58.251\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "177.177.58.251",
"serverIP": "117.146.224.13",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"177.177.58.251","externalIp":"177.177.58.251","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=177.177.58.251 ::: serverIP=177.177.58.251 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 177.177.58.251
serverIP: 117.146.224.13
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"9.255.68.141\",\"externalIp\":\"9.255.68.141\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "9.255.68.141",
"serverIP": "110.221.33.149",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"9.255.68.141","externalIp":"9.255.68.141","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=9.255.68.141 ::: serverIP=9.255.68.141 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 9.255.68.141
serverIP: 110.221.33.149
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"170.84.153.156\",\"externalIp\":\"170.84.153.156\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "170.84.153.156",
"serverIP": "39.18.44.156",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"170.84.153.156","externalIp":"170.84.153.156","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=170.84.153.156 ::: serverIP=170.84.153.156 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 170.84.153.156
serverIP: 39.18.44.156
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"163.71.181.206\",\"externalIp\":\"163.71.181.206\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "163.71.181.206",
"serverIP": "162.97.98.158",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"163.71.181.206","externalIp":"163.71.181.206","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=163.71.181.206 ::: serverIP=163.71.181.206 ::: userName=alice ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 163.71.181.206
serverIP: 162.97.98.158
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"127.128.253.77\",\"externalIp\":\"127.128.253.77\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "127.128.253.77",
"serverIP": "203.182.0.220",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"127.128.253.77","externalIp":"127.128.253.77","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=127.128.253.77 ::: serverIP=127.128.253.77 ::: userName=johndoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 127.128.253.77
serverIP: 203.182.0.220
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "tor-exit-13.zbau.f3netze.de",
"message": "WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.38.205.52\",\"externalIp\":\"255.38.205.52\",\"categories\":[\"Command and Control\",\"Personal Sites\"],\"tags\":[],\"destination\":\"tor-exit-13.zbau.f3netze.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-05T21:45:12.000Z\"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "tor-exit-13.zbau.f3netze.de",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-05T21:45:12.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Command and ControlPersonal Sites",
"streamName": "OpenDNS Detection",
"clientIP": "255.38.205.52",
"serverIP": "16.45.68.149",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=tor-exit-13.zbau.f3netze.de ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.38.205.52","externalIp":"255.38.205.52","categories":["Command and Control","Personal Sites"],"tags":[],"destination":"tor-exit-13.zbau.f3netze.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-05T21:45:12.000Z"} ::: clientIP=255.38.205.52 ::: serverIP=255.38.205.52 ::: userName=janedoe ::: created_at=2022-05-05T21:45:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlPersonal Sites ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-05T21:45:12.000Z ::: serverHostname=tor-exit-13.zbau.f3netze.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: tor-exit-13.zbau.f3netze.de
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: tor-exit-13.zbau.f3netze.de
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-05T21:45:12.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Command and ControlPersonal Sites
streamName: OpenDNS Detection
clientIP: 255.38.205.52
serverIP: 16.45.68.149
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"16.106.18.225\",\"externalIp\":\"16.106.18.225\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "16.106.18.225",
"serverIP": "216.97.195.98",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"16.106.18.225","externalIp":"16.106.18.225","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=16.106.18.225 ::: serverIP=16.106.18.225 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 16.106.18.225
serverIP: 216.97.195.98
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"151.237.246.109\",\"externalIp\":\"151.237.246.109\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "151.237.246.109",
"serverIP": "28.191.85.1",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"151.237.246.109","externalIp":"151.237.246.109","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=151.237.246.109 ::: serverIP=151.237.246.109 ::: userName=charlie ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 151.237.246.109
serverIP: 28.191.85.1
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"36.124.6.208\",\"externalIp\":\"36.124.6.208\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "36.124.6.208",
"serverIP": "111.163.9.217",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"36.124.6.208","externalIp":"36.124.6.208","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=36.124.6.208 ::: serverIP=36.124.6.208 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 36.124.6.208
serverIP: 111.163.9.217
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"50.111.185.107\",\"externalIp\":\"50.111.185.107\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "50.111.185.107",
"serverIP": "31.124.46.32",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.111.185.107","externalIp":"50.111.185.107","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=50.111.185.107 ::: serverIP=50.111.185.107 ::: userName=alice ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 50.111.185.107
serverIP: 31.124.46.32
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"48.97.220.138\",\"externalIp\":\"48.97.220.138\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "48.97.220.138",
"serverIP": "157.17.61.38",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"48.97.220.138","externalIp":"48.97.220.138","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=48.97.220.138 ::: serverIP=48.97.220.138 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 48.97.220.138
serverIP: 157.17.61.38
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"46.80.211.166\",\"externalIp\":\"46.80.211.166\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "46.80.211.166",
"serverIP": "191.105.146.212",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"46.80.211.166","externalIp":"46.80.211.166","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=46.80.211.166 ::: serverIP=46.80.211.166 ::: userName=charlie ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 46.80.211.166
serverIP: 191.105.146.212
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"71.86.117.214\",\"externalIp\":\"71.86.117.214\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "71.86.117.214",
"serverIP": "236.97.201.53",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"71.86.117.214","externalIp":"71.86.117.214","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=71.86.117.214 ::: serverIP=71.86.117.214 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 71.86.117.214
serverIP: 236.97.201.53
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"39.108.228.106\",\"externalIp\":\"39.108.228.106\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "39.108.228.106",
"serverIP": "36.124.87.176",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"39.108.228.106","externalIp":"39.108.228.106","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=39.108.228.106 ::: serverIP=39.108.228.106 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 39.108.228.106
serverIP: 36.124.87.176
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"148.215.240.65\",\"externalIp\":\"148.215.240.65\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "148.215.240.65",
"serverIP": "48.60.19.204",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"148.215.240.65","externalIp":"148.215.240.65","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=148.215.240.65 ::: serverIP=148.215.240.65 ::: userName=janedoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 148.215.240.65
serverIP: 48.60.19.204
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"171.184.160.184\",\"externalIp\":\"171.184.160.184\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "171.184.160.184",
"serverIP": "21.18.116.46",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"171.184.160.184","externalIp":"171.184.160.184","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=171.184.160.184 ::: serverIP=171.184.160.184 ::: userName=fish ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 171.184.160.184
serverIP: 21.18.116.46
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"93.114.57.21\",\"externalIp\":\"93.114.57.21\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "93.114.57.21",
"serverIP": "84.49.126.168",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"93.114.57.21","externalIp":"93.114.57.21","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=93.114.57.21 ::: serverIP=93.114.57.21 ::: userName=bob ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 93.114.57.21
serverIP: 84.49.126.168
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"15.100.204.133\",\"externalIp\":\"15.100.204.133\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:28:26.000Z\"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:28:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "15.100.204.133",
"serverIP": "142.150.244.118",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"15.100.204.133","externalIp":"15.100.204.133","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:28:26.000Z"} ::: clientIP=15.100.204.133 ::: serverIP=15.100.204.133 ::: userName=johndoe ::: created_at=2022-05-04T13:28:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:28:26.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:28:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 15.100.204.133
serverIP: 142.150.244.118
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"42.202.22.128\",\"externalIp\":\"42.202.22.128\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "42.202.22.128",
"serverIP": "0.191.83.50",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"42.202.22.128","externalIp":"42.202.22.128","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=42.202.22.128 ::: serverIP=42.202.22.128 ::: userName=nighthawk ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 42.202.22.128
serverIP: 0.191.83.50
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"68.227.4.20\",\"externalIp\":\"68.227.4.20\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "68.227.4.20",
"serverIP": "126.226.144.208",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"68.227.4.20","externalIp":"68.227.4.20","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=68.227.4.20 ::: serverIP=68.227.4.20 ::: userName=bob ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 68.227.4.20
serverIP: 126.226.144.208
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"201.181.150.188\",\"externalIp\":\"201.181.150.188\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "201.181.150.188",
"serverIP": "128.190.69.31",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"201.181.150.188","externalIp":"201.181.150.188","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=201.181.150.188 ::: serverIP=201.181.150.188 ::: userName=alice ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 201.181.150.188
serverIP: 128.190.69.31
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"96.145.124.75\",\"externalIp\":\"96.145.124.75\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-03T00:33:58.000Z\"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-03T00:33:58.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "96.145.124.75",
"serverIP": "121.77.85.230",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"96.145.124.75","externalIp":"96.145.124.75","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-03T00:33:58.000Z"} ::: clientIP=96.145.124.75 ::: serverIP=96.145.124.75 ::: userName=fish ::: created_at=2022-05-03T00:33:58.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-03T00:33:58.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-03T00:33:58.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 96.145.124.75
serverIP: 121.77.85.230
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"255.39.171.209\",\"externalIp\":\"255.39.171.209\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:27:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "255.39.171.209",
"serverIP": "74.67.150.38",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"255.39.171.209","externalIp":"255.39.171.209","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=255.39.171.209 ::: serverIP=255.39.171.209 ::: userName=nighthawk ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:27:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 255.39.171.209
serverIP: 74.67.150.38
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"38.187.98.73\",\"externalIp\":\"38.187.98.73\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:27:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "38.187.98.73",
"serverIP": "200.70.84.25",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"38.187.98.73","externalIp":"38.187.98.73","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=38.187.98.73 ::: serverIP=38.187.98.73 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:27:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 38.187.98.73
serverIP: 200.70.84.25
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"221.114.33.43\",\"externalIp\":\"221.114.33.43\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:27:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "221.114.33.43",
"serverIP": "59.0.197.205",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"221.114.33.43","externalIp":"221.114.33.43","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=221.114.33.43 ::: serverIP=221.114.33.43 ::: userName=charlie ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:27:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 221.114.33.43
serverIP: 59.0.197.205
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"194.16.84.189\",\"externalIp\":\"194.16.84.189\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:47.000Z\"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:27:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "194.16.84.189",
"serverIP": "214.60.222.147",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"194.16.84.189","externalIp":"194.16.84.189","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:47.000Z"} ::: clientIP=194.16.84.189 ::: serverIP=194.16.84.189 ::: userName=fish ::: created_at=2022-05-04T13:27:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:47.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: blue2.census.shodan.io
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: blue2.census.shodan.io
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-05-04T13:27:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals
streamName: OpenDNS Detection
clientIP: 194.16.84.189
serverIP: 214.60.222.147
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={"originId":522191426,"originType":"Networks","internalIp":"50.210.142.143","externalIp":"50.210.142.143","categories":["Search Engines","Software/Technology","Phishing","Search Engines and Portals"],"tags":[],"destination":"blue2.census.shodan.io","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-04T13:27:48.000Z"} ::: clientIP=50.210.142.143 ::: serverIP=50.210.142.143 ::: userName=johndoe ::: created_at=2022-05-04T13:27:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:48.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "blue2.census.shodan.io",
"message": "WitFoo-Artifact ::: fqdn=blue2.census.shodan.io ::: action=BLOCKED ::: message={\"originId\":522191426,\"originType\":\"Networks\",\"internalIp\":\"50.210.142.143\",\"externalIp\":\"50.210.142.143\",\"categories\":[\"Search Engines\",\"Software/Technology\",\"Phishing\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"blue2.census.shodan.io\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-04T13:27:48.000Z\"} ::: clientIP=50.210.142.143 ::: serverIP=50.210.142.143 ::: userName=johndoe ::: created_at=2022-05-04T13:27:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-04T13:27:48.000Z ::: serverHostname=blue2.census.shodan.io ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "blue2.census.shodan.io",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-05-04T13:27:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Search EnginesSoftware/TechnologyPhishingSearch Engines and Portals",
"streamName": "OpenDNS Detection",
"clientIP": "50.210.142.143",
"serverIP": "106.29.46.143",
"userName": "johndoe"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.