input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t46.166.64.159\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.166.64.159","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47798 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6499925783 streamName: microsoft-windows-security-auditing clientIP: 46.166.64.159 userName: $
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}}
{ "action": "Logon", "clientport": 47798, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-30T17:44:50.863Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-30T17:44:52.105Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t78.128.92.87\\n\\tSource Port:\\t\\t47798\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"78.128.92.87\",\"IpPort\":\"47798\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6499925783,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6499925783", "streamName": "microsoft-windows-security-auditing", "clientIP": "78.128.92.87", "userName": "$" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 47798 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6499925783 streamName: microsoft-windows-security-auditing clientIP: 78.128.92.87 userName: $
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"175.253.106.76\",\"externalIp\":\"139.183.8.27\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "175.253.106.76", "serverIP": "139.183.8.27", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 175.253.106.76 serverIP: 139.183.8.27 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"213.242.165.161\",\"externalIp\":\"1.209.3.208\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "213.242.165.161", "serverIP": "1.209.3.208", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 213.242.165.161 serverIP: 1.209.3.208 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"253.88.158.227\",\"externalIp\":\"83.68.185.44\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "253.88.158.227", "serverIP": "83.68.185.44", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 253.88.158.227 serverIP: 83.68.185.44 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"98.59.85.245\",\"externalIp\":\"163.96.137.4\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "98.59.85.245", "serverIP": "163.96.137.4", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 98.59.85.245 serverIP: 163.96.137.4 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"113.119.216.142\",\"externalIp\":\"180.40.251.11\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:18.000Z\"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "113.119.216.142", "serverIP": "180.40.251.11", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 113.119.216.142 serverIP: 180.40.251.11 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:18.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"241.210.129.255\",\"externalIp\":\"33.205.225.103\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:18.000Z\"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "241.210.129.255", "serverIP": "33.205.225.103", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:18.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 241.210.129.255 serverIP: 33.205.225.103 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-21T15:21:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"121.192.105.40\",\"externalIp\":\"155.193.90.245\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T15:21:47.000Z\"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "121.192.105.40", "serverIP": "155.193.90.245", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-21T15:21:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 121.192.105.40 serverIP: 155.193.90.245 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-21T15:21:47.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"55.75.226.145\",\"externalIp\":\"89.248.7.71\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T15:21:47.000Z\"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "55.75.226.145", "serverIP": "89.248.7.71", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-21T15:21:47.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 55.75.226.145 serverIP: 89.248.7.71 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-21T13:54:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"28.85.46.200\",\"externalIp\":\"94.56.140.41\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T13:54:19.000Z\"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "28.85.46.200", "serverIP": "94.56.140.41", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-21T13:54:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 28.85.46.200 serverIP: 94.56.140.41 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-21T13:54:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"77.43.77.55\",\"externalIp\":\"184.206.77.159\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T13:54:19.000Z\"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "77.43.77.55", "serverIP": "184.206.77.159", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-21T13:54:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 77.43.77.55 serverIP: 184.206.77.159 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"0.206.56.210\",\"externalIp\":\"225.61.43.192\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "0.206.56.210", "serverIP": "225.61.43.192", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 0.206.56.210 serverIP: 225.61.43.192 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-24T14:01:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"222.140.30.117\",\"externalIp\":\"0.195.119.19\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "222.140.30.117", "serverIP": "0.195.119.19", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-24T14:01:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 222.140.30.117 serverIP: 0.195.119.19 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"139.206.196.177\",\"externalIp\":\"100.101.42.1\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "139.206.196.177", "serverIP": "100.101.42.1", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 139.206.196.177 serverIP: 100.101.42.1 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"31.157.112.155\",\"externalIp\":\"255.57.18.67\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "31.157.112.155", "serverIP": "255.57.18.67", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 31.157.112.155 serverIP: 255.57.18.67 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T18:26:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"14.220.101.170\",\"externalIp\":\"54.218.230.128\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "us-east.lazerpenguin.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "us-east.lazerpenguin.com", "vendorcode": "Command and ControlMalwarePersonal VPNApplication", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "14.220.101.170", "serverIP": "54.218.230.128", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T18:26:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: us-east.lazerpenguin.com messagetype: firewall_action severitycode: 2 fqdn: us-east.lazerpenguin.com vendorcode: Command and ControlMalwarePersonal VPNApplication action: block streamName: OpenDNS Detection clientIP: 14.220.101.170 serverIP: 54.218.230.128 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T18:26:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"7.137.113.81\",\"externalIp\":\"18.66.121.0\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "us-east.lazerpenguin.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "us-east.lazerpenguin.com", "vendorcode": "Command and ControlMalwarePersonal VPNApplication", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "7.137.113.81", "serverIP": "18.66.121.0", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T18:26:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: us-east.lazerpenguin.com messagetype: firewall_action severitycode: 2 fqdn: us-east.lazerpenguin.com vendorcode: Command and ControlMalwarePersonal VPNApplication action: block streamName: OpenDNS Detection clientIP: 7.137.113.81 serverIP: 18.66.121.0 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"228.172.187.254\",\"externalIp\":\"175.30.36.23\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "228.172.187.254", "serverIP": "175.30.36.23", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 228.172.187.254 serverIP: 175.30.36.23 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"240.72.45.99\",\"externalIp\":\"34.75.200.60\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "240.72.45.99", "serverIP": "34.75.200.60", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 240.72.45.99 serverIP: 34.75.200.60 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-12T13:26:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"248.19.79.56\",\"externalIp\":\"129.132.50.182\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:26:42.000Z\"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "248.19.79.56", "serverIP": "129.132.50.182", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-12T13:26:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 248.19.79.56 serverIP: 129.132.50.182 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-12T13:26:42.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"130.232.72.220\",\"externalIp\":\"45.178.157.73\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:26:42.000Z\"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "130.232.72.220", "serverIP": "45.178.157.73", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-12T13:26:42.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 130.232.72.220 serverIP: 45.178.157.73 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T18:26:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"32.40.34.83\",\"externalIp\":\"230.10.142.90\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "us-east.lazerpenguin.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "us-east.lazerpenguin.com", "vendorcode": "Command and ControlMalwarePersonal VPNApplication", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "32.40.34.83", "serverIP": "230.10.142.90", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T18:26:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: us-east.lazerpenguin.com messagetype: firewall_action severitycode: 2 fqdn: us-east.lazerpenguin.com vendorcode: Command and ControlMalwarePersonal VPNApplication action: block streamName: OpenDNS Detection clientIP: 32.40.34.83 serverIP: 230.10.142.90 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-02T18:26:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"149.110.132.177\",\"externalIp\":\"116.200.249.8\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "us-east.lazerpenguin.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "us-east.lazerpenguin.com", "vendorcode": "Command and ControlMalwarePersonal VPNApplication", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "149.110.132.177", "serverIP": "116.200.249.8", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-02T18:26:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: us-east.lazerpenguin.com messagetype: firewall_action severitycode: 2 fqdn: us-east.lazerpenguin.com vendorcode: Command and ControlMalwarePersonal VPNApplication action: block streamName: OpenDNS Detection clientIP: 149.110.132.177 serverIP: 116.200.249.8 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"38.232.49.90\",\"externalIp\":\"170.56.248.101\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "38.232.49.90", "serverIP": "170.56.248.101", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 38.232.49.90 serverIP: 170.56.248.101 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"9.210.144.115\",\"externalIp\":\"201.66.201.211\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "9.210.144.115", "serverIP": "201.66.201.211", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 9.210.144.115 serverIP: 201.66.201.211 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-07T11:10:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"219.126.18.196\",\"externalIp\":\"125.154.86.40\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "relaxationstationmassages.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "relaxationstationmassages.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "219.126.18.196", "serverIP": "125.154.86.40", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-07T11:10:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: relaxationstationmassages.com messagetype: firewall_action severitycode: 2 fqdn: relaxationstationmassages.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 219.126.18.196 serverIP: 125.154.86.40 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-07T11:10:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"199.199.195.152\",\"externalIp\":\"120.146.121.47\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "relaxationstationmassages.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "relaxationstationmassages.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "199.199.195.152", "serverIP": "120.146.121.47", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-07T11:10:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: relaxationstationmassages.com messagetype: firewall_action severitycode: 2 fqdn: relaxationstationmassages.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 199.199.195.152 serverIP: 120.146.121.47 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"104.185.250.71\",\"externalIp\":\"160.133.221.105\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "104.185.250.71", "serverIP": "160.133.221.105", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 104.185.250.71 serverIP: 160.133.221.105 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"42.167.92.218\",\"externalIp\":\"71.159.4.201\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "42.167.92.218", "serverIP": "71.159.4.201", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 42.167.92.218 serverIP: 71.159.4.201 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-07T11:10:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"68.158.134.165\",\"externalIp\":\"187.152.87.15\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "relaxationstationmassages.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "relaxationstationmassages.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "68.158.134.165", "serverIP": "187.152.87.15", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-07T11:10:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: relaxationstationmassages.com messagetype: firewall_action severitycode: 2 fqdn: relaxationstationmassages.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 68.158.134.165 serverIP: 187.152.87.15 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-07T11:10:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"150.182.147.90\",\"externalIp\":\"184.139.191.209\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "relaxationstationmassages.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "relaxationstationmassages.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "150.182.147.90", "serverIP": "184.139.191.209", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-07T11:10:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: relaxationstationmassages.com messagetype: firewall_action severitycode: 2 fqdn: relaxationstationmassages.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 150.182.147.90 serverIP: 184.139.191.209 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"52.33.194.85\",\"externalIp\":\"37.157.52.25\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "52.33.194.85", "serverIP": "37.157.52.25", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 52.33.194.85 serverIP: 37.157.52.25 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-24T16:55:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"198.125.122.232\",\"externalIp\":\"22.72.65.211\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "198.125.122.232", "serverIP": "22.72.65.211", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-24T16:55:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 198.125.122.232 serverIP: 22.72.65.211 userName: charlie
Explain this syslog message