input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=173.18.74.107 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=11.190.140.2 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=11.190.140.2 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1657550294442
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /remote/fgt_lang
clientport: 61071
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 11.190.140.2
serverIP: 173.18.74.107
userName: - | Explain this syslog message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"ProxyIP:185.174.159.20",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication=\"Python-urllib/3.10\" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1657550294442 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/remote/fgt_lang",
"clientport": 61071,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "233.29.39.75",
"serverIP": "227.76.13.64",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jul 11 09:38:14 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=227.76.13.64 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=233.29.39.75 spt=61071 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jul 11 2022 09:38:14 rt=1657550294442 request=/remote/fgt_lang requestClientApplication="Python-urllib/3.10" dvchost=WAFirewall externalId=181edb24daa-e9fb9d4a cn2=61071 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=233.29.39.75 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'ProxyIP:185.174.159.20', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1657550294442
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /remote/fgt_lang
clientport: 61071
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 233.29.39.75
serverIP: 227.76.13.64
userName: - | Explain this syslog message |
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 8550,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1695020868103 ",
"message": "<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext=\"-\" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication=\"Unknown\" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"ProxyIP:34.65.184.108",
"rfc3164"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "55.35.223.175",
"serverIP": "79.123.6.34",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Sep 18 02:07:48 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=79.123.6.34 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=55.35.223.175 spt=8550 requestMethod=OPTIONS app=TLSv1.3 requestContext="-" start=Sep 18 2023 02:07:48 rt=1695020868103 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=18aa71de1f8-41c6f9a3 cn2=8550 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=55.35.223.175 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 8550
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1695020868103
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'ProxyIP:34.65.184.108', 'rfc3164']
vendorcode: 342
streamName: barracuda_waf
clientIP: 55.35.223.175
serverIP: 79.123.6.34
userName: - | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T13:43:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"216.61.147.186\",\"externalIp\":\"200.121.208.92\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "216.61.147.186",
"serverIP": "200.121.208.92",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"216.61.147.186","externalIp":"200.121.208.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=216.61.147.186 ::: serverIP=200.121.208.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T13:43:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 216.61.147.186
serverIP: 200.121.208.92
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T13:43:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"155.239.23.73\",\"externalIp\":\"122.208.121.239\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "155.239.23.73",
"serverIP": "122.208.121.239",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"155.239.23.73","externalIp":"122.208.121.239","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=155.239.23.73 ::: serverIP=122.208.121.239 ::: userName=charlie ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T13:43:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 155.239.23.73
serverIP: 122.208.121.239
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T13:43:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"117.62.174.177\",\"externalIp\":\"115.6.49.107\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "117.62.174.177",
"serverIP": "115.6.49.107",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"117.62.174.177","externalIp":"115.6.49.107","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=117.62.174.177 ::: serverIP=115.6.49.107 ::: userName=bob ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T13:43:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 117.62.174.177
serverIP: 115.6.49.107
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T13:43:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.206.140.225\",\"externalIp\":\"75.39.0.92\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T13:43:39.000Z\"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.206.140.225",
"serverIP": "75.39.0.92",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.206.140.225","externalIp":"75.39.0.92","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-16T13:43:39.000Z"} ::: clientIP=9.206.140.225 ::: serverIP=75.39.0.92 ::: userName=nighthawk ::: created_at=2023-01-16T13:43:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T13:43:39.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T13:43:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 9.206.140.225
serverIP: 75.39.0.92
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"146.181.37.50\",\"externalIp\":\"187.126.150.188\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "146.181.37.50",
"serverIP": "187.126.150.188",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"146.181.37.50","externalIp":"187.126.150.188","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=146.181.37.50 ::: serverIP=187.126.150.188 ::: userName=alice ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 146.181.37.50
serverIP: 187.126.150.188
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"138.43.171.241\",\"externalIp\":\"165.242.144.30\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "138.43.171.241",
"serverIP": "165.242.144.30",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"138.43.171.241","externalIp":"165.242.144.30","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=138.43.171.241 ::: serverIP=165.242.144.30 ::: userName=janedoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 138.43.171.241
serverIP: 165.242.144.30
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"137.57.190.51\",\"externalIp\":\"59.31.130.116\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "137.57.190.51",
"serverIP": "59.31.130.116",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"137.57.190.51","externalIp":"59.31.130.116","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=137.57.190.51 ::: serverIP=59.31.130.116 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 137.57.190.51
serverIP: 59.31.130.116
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"220.181.198.190\",\"externalIp\":\"134.88.210.4\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "220.181.198.190",
"serverIP": "134.88.210.4",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.181.198.190","externalIp":"134.88.210.4","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.181.198.190 ::: serverIP=134.88.210.4 ::: userName=charlie ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 220.181.198.190
serverIP: 134.88.210.4
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"220.168.25.0\",\"externalIp\":\"142.120.189.80\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "220.168.25.0",
"serverIP": "142.120.189.80",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"220.168.25.0","externalIp":"142.120.189.80","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=220.168.25.0 ::: serverIP=142.120.189.80 ::: userName=fish ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 220.168.25.0
serverIP: 142.120.189.80
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-20T12:05:28.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={\"originId\":535538311,\"originType\":\"Network Devices\",\"internalIp\":\"250.196.188.118\",\"externalIp\":\"111.7.247.158\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"win-prize-w1n.de\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-20T12:05:28.000Z\"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "win-prize-w1n.de",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "win-prize-w1n.de",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "250.196.188.118",
"serverIP": "111.7.247.158",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=win-prize-w1n.de ::: action=BLOCKED ::: message={"originId":535538311,"originType":"Network Devices","internalIp":"250.196.188.118","externalIp":"111.7.247.158","categories":["Malware","Not Actionable"],"tags":[],"destination":"win-prize-w1n.de","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-20T12:05:28.000Z"} ::: clientIP=250.196.188.118 ::: serverIP=111.7.247.158 ::: userName=johndoe ::: created_at=2023-01-20T12:05:28.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-20T12:05:28.000Z ::: serverHostname=win-prize-w1n.de ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-20T12:05:28.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: win-prize-w1n.de
messagetype: firewall_action
severitycode: 2
fqdn: win-prize-w1n.de
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 250.196.188.118
serverIP: 111.7.247.158
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"135.248.72.96\",\"externalIp\":\"135.248.72.96\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "135.248.72.96",
"serverIP": "9.175.159.5",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"135.248.72.96","externalIp":"135.248.72.96","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=135.248.72.96 ::: serverIP=135.248.72.96 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 135.248.72.96
serverIP: 9.175.159.5
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"165.171.192.98\",\"externalIp\":\"165.171.192.98\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "165.171.192.98",
"serverIP": "83.30.119.106",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"165.171.192.98","externalIp":"165.171.192.98","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=165.171.192.98 ::: serverIP=165.171.192.98 ::: userName=charlie ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 165.171.192.98
serverIP: 83.30.119.106
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"50.33.215.250\",\"externalIp\":\"50.33.215.250\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "50.33.215.250",
"serverIP": "148.105.241.79",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"50.33.215.250","externalIp":"50.33.215.250","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=50.33.215.250 ::: serverIP=50.33.215.250 ::: userName=johndoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 50.33.215.250
serverIP: 148.105.241.79
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"70.135.198.169\",\"externalIp\":\"70.135.198.169\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "70.135.198.169",
"serverIP": "244.196.83.22",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"70.135.198.169","externalIp":"70.135.198.169","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=70.135.198.169 ::: serverIP=70.135.198.169 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 70.135.198.169
serverIP: 244.196.83.22
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"173.128.212.145\",\"externalIp\":\"173.128.212.145\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "173.128.212.145",
"serverIP": "244.54.57.171",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"173.128.212.145","externalIp":"173.128.212.145","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=173.128.212.145 ::: serverIP=173.128.212.145 ::: userName=alice ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 173.128.212.145
serverIP: 244.54.57.171
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-17T19:33:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"37.217.233.8\",\"externalIp\":\"37.217.233.8\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"x2y2.fi\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-17T19:33:56.000Z\"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "x2y2.fi",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "x2y2.fi",
"vendorcode": "MalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "37.217.233.8",
"serverIP": "25.128.179.120",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=x2y2.fi ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"37.217.233.8","externalIp":"37.217.233.8","categories":["Malware","Phishing"],"tags":[],"destination":"x2y2.fi","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-17T19:33:56.000Z"} ::: clientIP=37.217.233.8 ::: serverIP=37.217.233.8 ::: userName=janedoe ::: created_at=2023-01-17T19:33:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-17T19:33:56.000Z ::: serverHostname=x2y2.fi ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-17T19:33:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: x2y2.fi
messagetype: firewall_action
severitycode: 2
fqdn: x2y2.fi
vendorcode: MalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 37.217.233.8
serverIP: 25.128.179.120
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-10T20:24:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"175.170.225.78\",\"externalIp\":\"80.162.71.71\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "175.170.225.78",
"serverIP": "80.162.71.71",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"175.170.225.78","externalIp":"80.162.71.71","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=175.170.225.78 ::: serverIP=80.162.71.71 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-10T20:24:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 175.170.225.78
serverIP: 80.162.71.71
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-10T20:24:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"106.91.133.65\",\"externalIp\":\"110.4.85.183\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "106.91.133.65",
"serverIP": "110.4.85.183",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"106.91.133.65","externalIp":"110.4.85.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=106.91.133.65 ::: serverIP=110.4.85.183 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-10T20:24:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 106.91.133.65
serverIP: 110.4.85.183
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-10T20:24:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"245.219.112.140\",\"externalIp\":\"220.198.112.51\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "245.219.112.140",
"serverIP": "220.198.112.51",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"245.219.112.140","externalIp":"220.198.112.51","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=245.219.112.140 ::: serverIP=220.198.112.51 ::: userName=johndoe ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-10T20:24:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 245.219.112.140
serverIP: 220.198.112.51
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-10T20:24:30.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":410614444,\"originType\":\"AD Users\",\"internalIp\":\"16.69.31.208\",\"externalIp\":\"179.218.204.38\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-10T20:24:30.000Z\"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "16.69.31.208",
"serverIP": "179.218.204.38",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":410614444,"originType":"AD Users","internalIp":"16.69.31.208","externalIp":"179.218.204.38","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-10T20:24:30.000Z"} ::: clientIP=16.69.31.208 ::: serverIP=179.218.204.38 ::: userName=fish ::: created_at=2023-01-10T20:24:30.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-10T20:24:30.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-10T20:24:30.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 16.69.31.208
serverIP: 179.218.204.38
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"22.219.251.118\",\"externalIp\":\"22.219.251.118\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "22.219.251.118",
"serverIP": "41.102.49.214",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"22.219.251.118","externalIp":"22.219.251.118","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=22.219.251.118 ::: serverIP=22.219.251.118 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 22.219.251.118
serverIP: 41.102.49.214
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"174.225.206.89\",\"externalIp\":\"174.225.206.89\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "174.225.206.89",
"serverIP": "248.21.97.96",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"174.225.206.89","externalIp":"174.225.206.89","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=174.225.206.89 ::: serverIP=174.225.206.89 ::: userName=bob ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 174.225.206.89
serverIP: 248.21.97.96
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"118.63.168.168\",\"externalIp\":\"118.63.168.168\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "118.63.168.168",
"serverIP": "217.183.242.155",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"118.63.168.168","externalIp":"118.63.168.168","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=118.63.168.168 ::: serverIP=118.63.168.168 ::: userName=fish ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 118.63.168.168
serverIP: 217.183.242.155
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"134.220.160.149\",\"externalIp\":\"134.220.160.149\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "134.220.160.149",
"serverIP": "126.221.26.100",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"134.220.160.149","externalIp":"134.220.160.149","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=134.220.160.149 ::: serverIP=134.220.160.149 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 134.220.160.149
serverIP: 126.221.26.100
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"85.122.18.183\",\"externalIp\":\"85.122.18.183\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "85.122.18.183",
"serverIP": "211.91.173.9",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"85.122.18.183","externalIp":"85.122.18.183","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=85.122.18.183 ::: serverIP=85.122.18.183 ::: userName=alice ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 85.122.18.183
serverIP: 211.91.173.9
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-16T14:22:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={\"originId\":409171352,\"originType\":\"Networks\",\"internalIp\":\"159.132.66.247\",\"externalIp\":\"159.132.66.247\",\"categories\":[\"Advertisements\",\"Web Spam\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"a.exdynsrv.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-16T14:22:52.000Z\"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "a.exdynsrv.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "a.exdynsrv.com",
"vendorcode": "AdvertisementsWeb SpamPotentially Harmful",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "159.132.66.247",
"serverIP": "236.45.234.83",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=a.exdynsrv.com ::: action=BLOCKED ::: message={"originId":409171352,"originType":"Networks","internalIp":"159.132.66.247","externalIp":"159.132.66.247","categories":["Advertisements","Web Spam","Potentially Harmful"],"tags":[],"destination":"a.exdynsrv.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-16T14:22:52.000Z"} ::: clientIP=159.132.66.247 ::: serverIP=159.132.66.247 ::: userName=johndoe ::: created_at=2022-12-16T14:22:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsWeb SpamPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-16T14:22:52.000Z ::: serverHostname=a.exdynsrv.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-16T14:22:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: a.exdynsrv.com
messagetype: firewall_action
severitycode: 2
fqdn: a.exdynsrv.com
vendorcode: AdvertisementsWeb SpamPotentially Harmful
action: block
streamName: OpenDNS Detection
clientIP: 159.132.66.247
serverIP: 236.45.234.83
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-09T13:16:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.107.82.109\",\"externalIp\":\"91.36.75.237\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.georgiainsights.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.georgiainsights.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "44.107.82.109",
"serverIP": "91.36.75.237",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.107.82.109","externalIp":"91.36.75.237","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=44.107.82.109 ::: serverIP=91.36.75.237 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-09T13:16:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.georgiainsights.com
messagetype: firewall_action
severitycode: 2
fqdn: www.georgiainsights.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 44.107.82.109
serverIP: 91.36.75.237
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-09T13:16:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"125.195.70.217\",\"externalIp\":\"171.81.66.28\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.georgiainsights.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.georgiainsights.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "125.195.70.217",
"serverIP": "171.81.66.28",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"125.195.70.217","externalIp":"171.81.66.28","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=125.195.70.217 ::: serverIP=171.81.66.28 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-09T13:16:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.georgiainsights.com
messagetype: firewall_action
severitycode: 2
fqdn: www.georgiainsights.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 125.195.70.217
serverIP: 171.81.66.28
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-09T13:16:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"215.66.74.166\",\"externalIp\":\"46.203.103.183\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.georgiainsights.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.georgiainsights.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "215.66.74.166",
"serverIP": "46.203.103.183",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"215.66.74.166","externalIp":"46.203.103.183","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=215.66.74.166 ::: serverIP=46.203.103.183 ::: userName=nighthawk ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-09T13:16:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.georgiainsights.com
messagetype: firewall_action
severitycode: 2
fqdn: www.georgiainsights.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 215.66.74.166
serverIP: 46.203.103.183
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-09T13:16:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"29.13.99.139\",\"externalIp\":\"48.88.127.219\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.georgiainsights.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-09T13:16:35.000Z\"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.georgiainsights.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.georgiainsights.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "29.13.99.139",
"serverIP": "48.88.127.219",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.georgiainsights.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"29.13.99.139","externalIp":"48.88.127.219","categories":["Malware"],"tags":[],"destination":"www.georgiainsights.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-01-09T13:16:35.000Z"} ::: clientIP=29.13.99.139 ::: serverIP=48.88.127.219 ::: userName=fish ::: created_at=2023-01-09T13:16:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-09T13:16:35.000Z ::: serverHostname=www.georgiainsights.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-09T13:16:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.georgiainsights.com
messagetype: firewall_action
severitycode: 2
fqdn: www.georgiainsights.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 29.13.99.139
serverIP: 48.88.127.219
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-01-16T12:41:21.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"96.165.222.83\",\"externalIp\":\"47.189.149.227\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.centervilleautorepairshop.us\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-01-16T12:41:21.000Z\"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.centervilleautorepairshop.us",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.centervilleautorepairshop.us",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "96.165.222.83",
"serverIP": "47.189.149.227",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.centervilleautorepairshop.us ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"96.165.222.83","externalIp":"47.189.149.227","categories":["Malware"],"tags":[],"destination":"www.centervilleautorepairshop.us","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-01-16T12:41:21.000Z"} ::: clientIP=96.165.222.83 ::: serverIP=47.189.149.227 ::: userName=janedoe ::: created_at=2023-01-16T12:41:21.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-01-16T12:41:21.000Z ::: serverHostname=www.centervilleautorepairshop.us ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-01-16T12:41:21.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.centervilleautorepairshop.us
messagetype: firewall_action
severitycode: 2
fqdn: www.centervilleautorepairshop.us
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 96.165.222.83
serverIP: 47.189.149.227
userName: janedoe | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.