input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t46.166.64.159\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"46.166.64.159","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47798
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6499925783
streamName: microsoft-windows-security-auditing
clientIP: 46.166.64.159
userName: $ | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}} | {
"action": "Logon",
"clientport": 47798,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-10-30T17:44:50.863Z\",\"agent\":{\"ephemeral_id\":\"f1be155c-635c-4c98-be91-3a2982bce2ec\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-10-30T17:44:52.105Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t$\\n\\tAccount Domain:\\t\\t$\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t78.128.92.87\\n\\tSource Port:\\t\\t47798\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"78.128.92.87\",\"IpPort\":\"47798\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"$\",\"TargetUserName\":\"$\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":732,\"thread\":{\"id\":2448}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6499925783,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6499925783",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "78.128.92.87",
"userName": "$"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-10-30T17:44:50.863Z","agent":{"ephemeral_id":"f1be155c-635c-4c98-be91-3a2982bce2ec","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-10-30T17:44:52.105Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t$\n\tAccount Domain:\t\t$\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t78.128.92.87\n\tSource Port:\t\t47798\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"78.128.92.87","IpPort":"47798","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"$","TargetUserName":"$","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":732,"thread":{"id":2448}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6499925783,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 47798
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6499925783
streamName: microsoft-windows-security-auditing
clientIP: 78.128.92.87
userName: $ | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"175.253.106.76\",\"externalIp\":\"139.183.8.27\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "175.253.106.76",
"serverIP": "139.183.8.27",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"175.253.106.76","externalIp":"139.183.8.27","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=175.253.106.76 ::: serverIP=139.183.8.27 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 175.253.106.76
serverIP: 139.183.8.27
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"213.242.165.161\",\"externalIp\":\"1.209.3.208\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "213.242.165.161",
"serverIP": "1.209.3.208",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"213.242.165.161","externalIp":"1.209.3.208","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=213.242.165.161 ::: serverIP=1.209.3.208 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 213.242.165.161
serverIP: 1.209.3.208
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"253.88.158.227\",\"externalIp\":\"83.68.185.44\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "253.88.158.227",
"serverIP": "83.68.185.44",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"253.88.158.227","externalIp":"83.68.185.44","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=253.88.158.227 ::: serverIP=83.68.185.44 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 253.88.158.227
serverIP: 83.68.185.44
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"98.59.85.245\",\"externalIp\":\"163.96.137.4\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "98.59.85.245",
"serverIP": "163.96.137.4",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"98.59.85.245","externalIp":"163.96.137.4","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=98.59.85.245 ::: serverIP=163.96.137.4 ::: userName=johndoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 98.59.85.245
serverIP: 163.96.137.4
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"113.119.216.142\",\"externalIp\":\"180.40.251.11\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:18.000Z\"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "113.119.216.142",
"serverIP": "180.40.251.11",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.119.216.142","externalIp":"180.40.251.11","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=113.119.216.142 ::: serverIP=180.40.251.11 ::: userName=fish ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 113.119.216.142
serverIP: 180.40.251.11
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:18.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"241.210.129.255\",\"externalIp\":\"33.205.225.103\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:18.000Z\"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "241.210.129.255",
"serverIP": "33.205.225.103",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"241.210.129.255","externalIp":"33.205.225.103","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:18.000Z"} ::: clientIP=241.210.129.255 ::: serverIP=33.205.225.103 ::: userName=johndoe ::: created_at=2022-06-24T14:01:18.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:18.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:18.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 241.210.129.255
serverIP: 33.205.225.103
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-21T15:21:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"121.192.105.40\",\"externalIp\":\"155.193.90.245\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T15:21:47.000Z\"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "121.192.105.40",
"serverIP": "155.193.90.245",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"121.192.105.40","externalIp":"155.193.90.245","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=121.192.105.40 ::: serverIP=155.193.90.245 ::: userName=nighthawk ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-21T15:21:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 121.192.105.40
serverIP: 155.193.90.245
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-21T15:21:47.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"55.75.226.145\",\"externalIp\":\"89.248.7.71\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T15:21:47.000Z\"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "55.75.226.145",
"serverIP": "89.248.7.71",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"55.75.226.145","externalIp":"89.248.7.71","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-21T15:21:47.000Z"} ::: clientIP=55.75.226.145 ::: serverIP=89.248.7.71 ::: userName=charlie ::: created_at=2022-06-21T15:21:47.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T15:21:47.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-21T15:21:47.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 55.75.226.145
serverIP: 89.248.7.71
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-21T13:54:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"28.85.46.200\",\"externalIp\":\"94.56.140.41\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T13:54:19.000Z\"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "28.85.46.200",
"serverIP": "94.56.140.41",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"28.85.46.200","externalIp":"94.56.140.41","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=28.85.46.200 ::: serverIP=94.56.140.41 ::: userName=alice ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-21T13:54:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 28.85.46.200
serverIP: 94.56.140.41
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-21T13:54:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"77.43.77.55\",\"externalIp\":\"184.206.77.159\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-21T13:54:19.000Z\"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "77.43.77.55",
"serverIP": "184.206.77.159",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"77.43.77.55","externalIp":"184.206.77.159","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-21T13:54:19.000Z"} ::: clientIP=77.43.77.55 ::: serverIP=184.206.77.159 ::: userName=johndoe ::: created_at=2022-06-21T13:54:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-21T13:54:19.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-21T13:54:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 77.43.77.55
serverIP: 184.206.77.159
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"0.206.56.210\",\"externalIp\":\"225.61.43.192\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "0.206.56.210",
"serverIP": "225.61.43.192",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"0.206.56.210","externalIp":"225.61.43.192","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=0.206.56.210 ::: serverIP=225.61.43.192 ::: userName=alice ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 0.206.56.210
serverIP: 225.61.43.192
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-24T14:01:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613984,\"originType\":\"AD Users\",\"internalIp\":\"222.140.30.117\",\"externalIp\":\"0.195.119.19\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-24T14:01:15.000Z\"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "222.140.30.117",
"serverIP": "0.195.119.19",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613984,"originType":"AD Users","internalIp":"222.140.30.117","externalIp":"0.195.119.19","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-24T14:01:15.000Z"} ::: clientIP=222.140.30.117 ::: serverIP=0.195.119.19 ::: userName=janedoe ::: created_at=2022-06-24T14:01:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-24T14:01:15.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-24T14:01:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 222.140.30.117
serverIP: 0.195.119.19
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"139.206.196.177\",\"externalIp\":\"100.101.42.1\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "139.206.196.177",
"serverIP": "100.101.42.1",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"139.206.196.177","externalIp":"100.101.42.1","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=139.206.196.177 ::: serverIP=100.101.42.1 ::: userName=charlie ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 139.206.196.177
serverIP: 100.101.42.1
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"31.157.112.155\",\"externalIp\":\"255.57.18.67\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "31.157.112.155",
"serverIP": "255.57.18.67",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.157.112.155","externalIp":"255.57.18.67","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=31.157.112.155 ::: serverIP=255.57.18.67 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 31.157.112.155
serverIP: 255.57.18.67
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T18:26:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"14.220.101.170\",\"externalIp\":\"54.218.230.128\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "Command and ControlMalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "14.220.101.170",
"serverIP": "54.218.230.128",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"14.220.101.170","externalIp":"54.218.230.128","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=14.220.101.170 ::: serverIP=54.218.230.128 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T18:26:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: Command and ControlMalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 14.220.101.170
serverIP: 54.218.230.128
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T18:26:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"7.137.113.81\",\"externalIp\":\"18.66.121.0\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "Command and ControlMalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "7.137.113.81",
"serverIP": "18.66.121.0",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"7.137.113.81","externalIp":"18.66.121.0","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=7.137.113.81 ::: serverIP=18.66.121.0 ::: userName=fish ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T18:26:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: Command and ControlMalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 7.137.113.81
serverIP: 18.66.121.0
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"228.172.187.254\",\"externalIp\":\"175.30.36.23\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "228.172.187.254",
"serverIP": "175.30.36.23",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"228.172.187.254","externalIp":"175.30.36.23","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=228.172.187.254 ::: serverIP=175.30.36.23 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 228.172.187.254
serverIP: 175.30.36.23
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"240.72.45.99\",\"externalIp\":\"34.75.200.60\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "240.72.45.99",
"serverIP": "34.75.200.60",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"240.72.45.99","externalIp":"34.75.200.60","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=240.72.45.99 ::: serverIP=34.75.200.60 ::: userName=alice ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 240.72.45.99
serverIP: 34.75.200.60
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:26:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"248.19.79.56\",\"externalIp\":\"129.132.50.182\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:26:42.000Z\"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "248.19.79.56",
"serverIP": "129.132.50.182",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"248.19.79.56","externalIp":"129.132.50.182","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=248.19.79.56 ::: serverIP=129.132.50.182 ::: userName=charlie ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:26:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 248.19.79.56
serverIP: 129.132.50.182
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-12T13:26:42.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"130.232.72.220\",\"externalIp\":\"45.178.157.73\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-12T13:26:42.000Z\"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "130.232.72.220",
"serverIP": "45.178.157.73",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"130.232.72.220","externalIp":"45.178.157.73","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-12T13:26:42.000Z"} ::: clientIP=130.232.72.220 ::: serverIP=45.178.157.73 ::: userName=bob ::: created_at=2022-05-12T13:26:42.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-12T13:26:42.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-12T13:26:42.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 130.232.72.220
serverIP: 45.178.157.73
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T18:26:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"32.40.34.83\",\"externalIp\":\"230.10.142.90\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "Command and ControlMalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "32.40.34.83",
"serverIP": "230.10.142.90",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"32.40.34.83","externalIp":"230.10.142.90","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=32.40.34.83 ::: serverIP=230.10.142.90 ::: userName=alice ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T18:26:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: Command and ControlMalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 32.40.34.83
serverIP: 230.10.142.90
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-02T18:26:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"149.110.132.177\",\"externalIp\":\"116.200.249.8\",\"categories\":[\"Command and Control\",\"Malware\",\"Personal VPN\",\"Application\"],\"tags\":[],\"destination\":\"us-east.lazerpenguin.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-02T18:26:43.000Z\"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "us-east.lazerpenguin.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "us-east.lazerpenguin.com",
"vendorcode": "Command and ControlMalwarePersonal VPNApplication",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "149.110.132.177",
"serverIP": "116.200.249.8",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=us-east.lazerpenguin.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"149.110.132.177","externalIp":"116.200.249.8","categories":["Command and Control","Malware","Personal VPN","Application"],"tags":[],"destination":"us-east.lazerpenguin.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-02T18:26:43.000Z"} ::: clientIP=149.110.132.177 ::: serverIP=116.200.249.8 ::: userName=janedoe ::: created_at=2022-06-02T18:26:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Command and ControlMalwarePersonal VPNApplication ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-02T18:26:43.000Z ::: serverHostname=us-east.lazerpenguin.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-02T18:26:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: us-east.lazerpenguin.com
messagetype: firewall_action
severitycode: 2
fqdn: us-east.lazerpenguin.com
vendorcode: Command and ControlMalwarePersonal VPNApplication
action: block
streamName: OpenDNS Detection
clientIP: 149.110.132.177
serverIP: 116.200.249.8
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"38.232.49.90\",\"externalIp\":\"170.56.248.101\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "38.232.49.90",
"serverIP": "170.56.248.101",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"38.232.49.90","externalIp":"170.56.248.101","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=38.232.49.90 ::: serverIP=170.56.248.101 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 38.232.49.90
serverIP: 170.56.248.101
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"9.210.144.115\",\"externalIp\":\"201.66.201.211\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.210.144.115",
"serverIP": "201.66.201.211",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"9.210.144.115","externalIp":"201.66.201.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=9.210.144.115 ::: serverIP=201.66.201.211 ::: userName=bob ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 9.210.144.115
serverIP: 201.66.201.211
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"219.126.18.196\",\"externalIp\":\"125.154.86.40\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "219.126.18.196",
"serverIP": "125.154.86.40",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"219.126.18.196","externalIp":"125.154.86.40","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=219.126.18.196 ::: serverIP=125.154.86.40 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 219.126.18.196
serverIP: 125.154.86.40
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"199.199.195.152\",\"externalIp\":\"120.146.121.47\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "199.199.195.152",
"serverIP": "120.146.121.47",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"199.199.195.152","externalIp":"120.146.121.47","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=199.199.195.152 ::: serverIP=120.146.121.47 ::: userName=nighthawk ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 199.199.195.152
serverIP: 120.146.121.47
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"104.185.250.71\",\"externalIp\":\"160.133.221.105\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "104.185.250.71",
"serverIP": "160.133.221.105",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"104.185.250.71","externalIp":"160.133.221.105","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=104.185.250.71 ::: serverIP=160.133.221.105 ::: userName=alice ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 104.185.250.71
serverIP: 160.133.221.105
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"42.167.92.218\",\"externalIp\":\"71.159.4.201\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "42.167.92.218",
"serverIP": "71.159.4.201",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"42.167.92.218","externalIp":"71.159.4.201","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=42.167.92.218 ::: serverIP=71.159.4.201 ::: userName=janedoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 42.167.92.218
serverIP: 71.159.4.201
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"68.158.134.165\",\"externalIp\":\"187.152.87.15\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "68.158.134.165",
"serverIP": "187.152.87.15",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"68.158.134.165","externalIp":"187.152.87.15","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=68.158.134.165 ::: serverIP=187.152.87.15 ::: userName=charlie ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 68.158.134.165
serverIP: 187.152.87.15
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-07T11:10:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"150.182.147.90\",\"externalIp\":\"184.139.191.209\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"relaxationstationmassages.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-07T11:10:25.000Z\"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "relaxationstationmassages.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "relaxationstationmassages.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "150.182.147.90",
"serverIP": "184.139.191.209",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=relaxationstationmassages.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.182.147.90","externalIp":"184.139.191.209","categories":["Phishing"],"tags":[],"destination":"relaxationstationmassages.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-07-07T11:10:25.000Z"} ::: clientIP=150.182.147.90 ::: serverIP=184.139.191.209 ::: userName=johndoe ::: created_at=2022-07-07T11:10:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-07T11:10:25.000Z ::: serverHostname=relaxationstationmassages.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-07T11:10:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: relaxationstationmassages.com
messagetype: firewall_action
severitycode: 2
fqdn: relaxationstationmassages.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 150.182.147.90
serverIP: 184.139.191.209
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"52.33.194.85\",\"externalIp\":\"37.157.52.25\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "52.33.194.85",
"serverIP": "37.157.52.25",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"52.33.194.85","externalIp":"37.157.52.25","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=52.33.194.85 ::: serverIP=37.157.52.25 ::: userName=johndoe ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 52.33.194.85
serverIP: 37.157.52.25
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-24T16:55:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"198.125.122.232\",\"externalIp\":\"22.72.65.211\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-24T16:55:15.000Z\"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "198.125.122.232",
"serverIP": "22.72.65.211",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"198.125.122.232","externalIp":"22.72.65.211","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-24T16:55:15.000Z"} ::: clientIP=198.125.122.232 ::: serverIP=22.72.65.211 ::: userName=charlie ::: created_at=2022-05-24T16:55:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-24T16:55:15.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-24T16:55:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 198.125.122.232
serverIP: 22.72.65.211
userName: charlie | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.