input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1657550294442 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /remote/fgt_lang clientport: 61071 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 11.190.140.2 serverIP: 173.18.74.107 userName: -
Explain this syslog message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "ProxyIP:185.174.159.20", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1657550294442 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/remote/fgt_lang", "clientport": 61071, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "233.29.39.75", "serverIP": "227.76.13.64", "userName": "-" }
Create a JSON artifact from the message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1657550294442 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /remote/fgt_lang clientport: 61071 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 233.29.39.75 serverIP: 227.76.13.64 userName: -
Explain this syslog message
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "action": "block", "clientport": 8550, "facilitycode": 23, "facilitylabel": "local7", "fqdn": "/", "localhostname": "WAFirewall", "localstarttime": "1695020868103 ", "message": "<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "messagetype": "GEO_IP_BLOCK", "priority": 185, "senderhost": "10.0.0.250", "sensitivity": "normal", "serverport": 443, "severitycode": 9, "severitylabel": "alert", "sourceinfo": "unknown", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "ProxyIP:34.65.184.108", "rfc3164" ], "vendorcode": "342", "streamName": "barracuda_waf", "clientIP": "55.35.223.175", "serverIP": "79.123.6.34", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: action: block clientport: 8550 facilitycode: 23 facilitylabel: local7 fqdn: / localhostname: WAFirewall localstarttime: 1695020868103 messagetype: GEO_IP_BLOCK priority: 185 senderhost: 10.0.0.250 sensitivity: normal serverport: 443 severitycode: 9 severitylabel: alert sourceinfo: unknown tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.65.184.108', 'rfc3164'] vendorcode: 342 streamName: barracuda_waf clientIP: 55.35.223.175 serverIP: 79.123.6.34 userName: -
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T13:43:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"216.61.147.186\",\"externalIp\":\"200.121.208.92\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "216.61.147.186", "serverIP": "200.121.208.92", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T13:43:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 216.61.147.186 serverIP: 200.121.208.92 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T13:43:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"155.239.23.73\",\"externalIp\":\"122.208.121.239\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "155.239.23.73", "serverIP": "122.208.121.239", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T13:43:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 155.239.23.73 serverIP: 122.208.121.239 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T13:43:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"117.62.174.177\",\"externalIp\":\"115.6.49.107\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "117.62.174.177", "serverIP": "115.6.49.107", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T13:43:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 117.62.174.177 serverIP: 115.6.49.107 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T13:43:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.206.140.225\",\"externalIp\":\"75.39.0.92\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "9.206.140.225", "serverIP": "75.39.0.92", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T13:43:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 9.206.140.225 serverIP: 75.39.0.92 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"146.181.37.50\",\"externalIp\":\"187.126.150.188\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "146.181.37.50", "serverIP": "187.126.150.188", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 146.181.37.50 serverIP: 187.126.150.188 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"138.43.171.241\",\"externalIp\":\"165.242.144.30\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "138.43.171.241", "serverIP": "165.242.144.30", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 138.43.171.241 serverIP: 165.242.144.30 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"137.57.190.51\",\"externalIp\":\"59.31.130.116\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "137.57.190.51", "serverIP": "59.31.130.116", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 137.57.190.51 serverIP: 59.31.130.116 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"220.181.198.190\",\"externalIp\":\"134.88.210.4\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "220.181.198.190", "serverIP": "134.88.210.4", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 220.181.198.190 serverIP: 134.88.210.4 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"220.168.25.0\",\"externalIp\":\"142.120.189.80\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "220.168.25.0", "serverIP": "142.120.189.80", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 220.168.25.0 serverIP: 142.120.189.80 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-20T12:05:28.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"250.196.188.118\",\"externalIp\":\"111.7.247.158\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "win-prize-w1n.de", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "win-prize-w1n.de", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "250.196.188.118", "serverIP": "111.7.247.158", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-20T12:05:28.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: win-prize-w1n.de messagetype: firewall_action severitycode: 2 fqdn: win-prize-w1n.de vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 250.196.188.118 serverIP: 111.7.247.158 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"135.248.72.96\",\"externalIp\":\"135.248.72.96\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.248.72.96", "serverIP": "9.175.159.5", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 135.248.72.96 serverIP: 9.175.159.5 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"165.171.192.98\",\"externalIp\":\"165.171.192.98\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "165.171.192.98", "serverIP": "83.30.119.106", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 165.171.192.98 serverIP: 83.30.119.106 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"50.33.215.250\",\"externalIp\":\"50.33.215.250\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "50.33.215.250", "serverIP": "148.105.241.79", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 50.33.215.250 serverIP: 148.105.241.79 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"70.135.198.169\",\"externalIp\":\"70.135.198.169\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "70.135.198.169", "serverIP": "244.196.83.22", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 70.135.198.169 serverIP: 244.196.83.22 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"173.128.212.145\",\"externalIp\":\"173.128.212.145\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "173.128.212.145", "serverIP": "244.54.57.171", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 173.128.212.145 serverIP: 244.54.57.171 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-17T19:33:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"37.217.233.8\",\"externalIp\":\"37.217.233.8\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "x2y2.fi", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "x2y2.fi", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "37.217.233.8", "serverIP": "25.128.179.120", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-17T19:33:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: x2y2.fi messagetype: firewall_action severitycode: 2 fqdn: x2y2.fi vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 37.217.233.8 serverIP: 25.128.179.120 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-10T20:24:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"175.170.225.78\",\"externalIp\":\"80.162.71.71\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "175.170.225.78", "serverIP": "80.162.71.71", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-10T20:24:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 175.170.225.78 serverIP: 80.162.71.71 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-10T20:24:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"106.91.133.65\",\"externalIp\":\"110.4.85.183\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "106.91.133.65", "serverIP": "110.4.85.183", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-10T20:24:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 106.91.133.65 serverIP: 110.4.85.183 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-10T20:24:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"245.219.112.140\",\"externalIp\":\"220.198.112.51\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "245.219.112.140", "serverIP": "220.198.112.51", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-10T20:24:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 245.219.112.140 serverIP: 220.198.112.51 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-10T20:24:30.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"16.69.31.208\",\"externalIp\":\"179.218.204.38\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "16.69.31.208", "serverIP": "179.218.204.38", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-10T20:24:30.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 16.69.31.208 serverIP: 179.218.204.38 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"22.219.251.118\",\"externalIp\":\"22.219.251.118\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "22.219.251.118", "serverIP": "41.102.49.214", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 22.219.251.118 serverIP: 41.102.49.214 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"174.225.206.89\",\"externalIp\":\"174.225.206.89\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "174.225.206.89", "serverIP": "248.21.97.96", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 174.225.206.89 serverIP: 248.21.97.96 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"118.63.168.168\",\"externalIp\":\"118.63.168.168\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "118.63.168.168", "serverIP": "217.183.242.155", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 118.63.168.168 serverIP: 217.183.242.155 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"134.220.160.149\",\"externalIp\":\"134.220.160.149\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "134.220.160.149", "serverIP": "126.221.26.100", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 134.220.160.149 serverIP: 126.221.26.100 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"85.122.18.183\",\"externalIp\":\"85.122.18.183\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "85.122.18.183", "serverIP": "211.91.173.9", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 85.122.18.183 serverIP: 211.91.173.9 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-16T14:22:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"159.132.66.247\",\"externalIp\":\"159.132.66.247\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "a.exdynsrv.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "a.exdynsrv.com", "vendorcode": "AdvertisementsWeb SpamPotentially Harmful", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "159.132.66.247", "serverIP": "236.45.234.83", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-16T14:22:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: a.exdynsrv.com messagetype: firewall_action severitycode: 2 fqdn: a.exdynsrv.com vendorcode: AdvertisementsWeb SpamPotentially Harmful action: block streamName: OpenDNS Detection clientIP: 159.132.66.247 serverIP: 236.45.234.83 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-09T13:16:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.107.82.109\",\"externalIp\":\"91.36.75.237\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.georgiainsights.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.georgiainsights.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "44.107.82.109", "serverIP": "91.36.75.237", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-09T13:16:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.georgiainsights.com messagetype: firewall_action severitycode: 2 fqdn: www.georgiainsights.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 44.107.82.109 serverIP: 91.36.75.237 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-09T13:16:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"125.195.70.217\",\"externalIp\":\"171.81.66.28\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.georgiainsights.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.georgiainsights.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "125.195.70.217", "serverIP": "171.81.66.28", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-09T13:16:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.georgiainsights.com messagetype: firewall_action severitycode: 2 fqdn: www.georgiainsights.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 125.195.70.217 serverIP: 171.81.66.28 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-09T13:16:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"215.66.74.166\",\"externalIp\":\"46.203.103.183\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.georgiainsights.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.georgiainsights.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "215.66.74.166", "serverIP": "46.203.103.183", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-09T13:16:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.georgiainsights.com messagetype: firewall_action severitycode: 2 fqdn: www.georgiainsights.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 215.66.74.166 serverIP: 46.203.103.183 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-09T13:16:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"29.13.99.139\",\"externalIp\":\"48.88.127.219\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.georgiainsights.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.georgiainsights.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "29.13.99.139", "serverIP": "48.88.127.219", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-09T13:16:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.georgiainsights.com messagetype: firewall_action severitycode: 2 fqdn: www.georgiainsights.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 29.13.99.139 serverIP: 48.88.127.219 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-01-16T12:41:21.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"96.165.222.83\",\"externalIp\":\"47.189.149.227\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.centervilleautorepairshop.us\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T12:41:21.000Z\"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.centervilleautorepairshop.us", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.centervilleautorepairshop.us", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "96.165.222.83", "serverIP": "47.189.149.227", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-01-16T12:41:21.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.centervilleautorepairshop.us messagetype: firewall_action severitycode: 2 fqdn: www.centervilleautorepairshop.us vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 96.165.222.83 serverIP: 47.189.149.227 userName: janedoe
Explain this syslog message