input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:53:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 181.189.181.229
serverIP: 48.138.125.34
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:53:35.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"156.12.106.107\",\"externalIp\":\"198.33.100.216\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "156.12.106.107",
"serverIP": "198.33.100.216",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:53:35.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 156.12.106.107
serverIP: 198.33.100.216
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:38:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"90.123.55.16\",\"externalIp\":\"97.201.230.6\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "90.123.55.16",
"serverIP": "97.201.230.6",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:38:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 90.123.55.16
serverIP: 97.201.230.6
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:38:39.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"116.28.192.134\",\"externalIp\":\"170.194.224.48\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "116.28.192.134",
"serverIP": "170.194.224.48",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:38:39.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 116.28.192.134
serverIP: 170.194.224.48
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:44:55.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"208.82.88.103\",\"externalIp\":\"233.58.188.98\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "208.82.88.103",
"serverIP": "233.58.188.98",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:44:55.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 208.82.88.103
serverIP: 233.58.188.98
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-26T15:44:55.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"226.232.87.26\",\"externalIp\":\"153.170.153.181\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "ivu.fbc-statesboro.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "ivu.fbc-statesboro.org",
"vendorcode": "ReligiousPhishingReligion",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "226.232.87.26",
"serverIP": "153.170.153.181",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-26T15:44:55.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: ivu.fbc-statesboro.org
messagetype: firewall_action
severitycode: 2
fqdn: ivu.fbc-statesboro.org
vendorcode: ReligiousPhishingReligion
action: block
streamName: OpenDNS Detection
clientIP: 226.232.87.26
serverIP: 153.170.153.181
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-25T09:24:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"170.14.225.80\",\"externalIp\":\"137.13.144.12\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "170.14.225.80",
"serverIP": "137.13.144.12",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-25T09:24:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 170.14.225.80
serverIP: 137.13.144.12
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-25T09:24:49.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"29.57.88.214\",\"externalIp\":\"64.179.198.70\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "flint.defybrick.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "flint.defybrick.com",
"vendorcode": "Phishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "29.57.88.214",
"serverIP": "64.179.198.70",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-25T09:24:49.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: flint.defybrick.com
messagetype: firewall_action
severitycode: 2
fqdn: flint.defybrick.com
vendorcode: Phishing
action: block
streamName: OpenDNS Detection
clientIP: 29.57.88.214
serverIP: 64.179.198.70
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"116.122.56.203\",\"externalIp\":\"223.7.167.151\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "116.122.56.203",
"serverIP": "223.7.167.151",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 116.122.56.203
serverIP: 223.7.167.151
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"69.121.26.27\",\"externalIp\":\"66.119.51.113\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "69.121.26.27",
"serverIP": "66.119.51.113",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 69.121.26.27
serverIP: 66.119.51.113
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"115.206.58.210\",\"externalIp\":\"231.186.150.10\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "115.206.58.210",
"serverIP": "231.186.150.10",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 115.206.58.210
serverIP: 231.186.150.10
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"164.196.117.25\",\"externalIp\":\"109.67.3.145\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "164.196.117.25",
"serverIP": "109.67.3.145",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 164.196.117.25
serverIP: 109.67.3.145
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"38.115.100.180\",\"externalIp\":\"89.156.238.241\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "38.115.100.180",
"serverIP": "89.156.238.241",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 38.115.100.180
serverIP: 89.156.238.241
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"241.85.89.97\",\"externalIp\":\"34.17.80.125\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "241.85.89.97",
"serverIP": "34.17.80.125",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 241.85.89.97
serverIP: 34.17.80.125
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"44.169.228.137\",\"externalIp\":\"127.6.169.224\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "44.169.228.137",
"serverIP": "127.6.169.224",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 44.169.228.137
serverIP: 127.6.169.224
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"188.41.18.86\",\"externalIp\":\"127.49.182.148\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "188.41.18.86",
"serverIP": "127.49.182.148",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 188.41.18.86
serverIP: 127.49.182.148
userName: fish | Explain this syslog message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204 | {
"senderhost": "10.19.251.5",
"serverport": 53,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204",
"action": "block",
"localstarttime": "Mar 26 01:55:39",
"sensitivity": "normal",
"application": "junos-dns-udp",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 51839,
"protocol": 17,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "170.228.250.104",
"serverIP": "35.81.123.133",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 53
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 01:55:39
sensitivity: normal
application: junos-dns-udp
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 51839
protocol: 17
facilitycode: 1
streamName: juniper_srx
clientIP: 170.228.250.104
serverIP: 35.81.123.133
userName: nighthawk | Explain this syslog message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204 | {
"senderhost": "10.19.251.5",
"serverport": 53,
"severitylabel": "informational",
"tags": [
"rfc3164",
"juniper_srx",
"routing_info"
],
"productids": [
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204",
"action": "block",
"localstarttime": "Mar 26 01:55:39",
"sensitivity": "normal",
"application": "junos-dns-udp",
"rulename": "DENY",
"program": "RT_FLOW",
"localhostname": "aurdcfwj1-s",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "routing_info",
"clientport": 51839,
"protocol": 17,
"facilitycode": 1,
"streamName": "juniper_srx",
"clientIP": "44.58.234.209",
"serverIP": "62.134.222.21",
"userName": "johndoe"
} | Create a JSON artifact from the message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204 | Product: Juniper FW
Vendor: Juniper | Identify this syslog message |
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204 | This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message:
senderhost: 10.19.251.5
serverport: 53
severitylabel: informational
tags: ['rfc3164', 'juniper_srx', 'routing_info']
productids: [0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 26 01:55:39
sensitivity: normal
application: junos-dns-udp
rulename: DENY
program: RT_FLOW
localhostname: aurdcfwj1-s
priority: 14
facilitylabel: user-level
messagetype: routing_info
clientport: 51839
protocol: 17
facilitycode: 1
streamName: juniper_srx
clientIP: 44.58.234.209
serverIP: 62.134.222.21
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"193.123.205.168\",\"externalIp\":\"193.123.205.168\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "193.123.205.168",
"serverIP": "36.21.223.224",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 193.123.205.168
serverIP: 36.21.223.224
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"212.187.33.121\",\"externalIp\":\"212.187.33.121\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "212.187.33.121",
"serverIP": "203.84.251.33",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 212.187.33.121
serverIP: 203.84.251.33
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"130.179.5.33\",\"externalIp\":\"130.179.5.33\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "130.179.5.33",
"serverIP": "145.218.109.144",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 130.179.5.33
serverIP: 145.218.109.144
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"218.102.144.110\",\"externalIp\":\"218.102.144.110\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "218.102.144.110",
"serverIP": "78.242.163.254",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 218.102.144.110
serverIP: 78.242.163.254
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"70.105.245.11\",\"externalIp\":\"70.105.245.11\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "70.105.245.11",
"serverIP": "53.53.89.138",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 70.105.245.11
serverIP: 53.53.89.138
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"119.140.49.240\",\"externalIp\":\"119.140.49.240\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "119.140.49.240",
"serverIP": "193.246.226.205",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 119.140.49.240
serverIP: 193.246.226.205
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"39.217.153.41\",\"externalIp\":\"85.235.139.104\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "39.217.153.41",
"serverIP": "85.235.139.104",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 39.217.153.41
serverIP: 85.235.139.104
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"112.151.58.134\",\"externalIp\":\"183.151.212.179\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "112.151.58.134",
"serverIP": "183.151.212.179",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 112.151.58.134
serverIP: 183.151.212.179
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"15.132.145.228\",\"externalIp\":\"197.252.178.132\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "15.132.145.228",
"serverIP": "197.252.178.132",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 15.132.145.228
serverIP: 197.252.178.132
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"101.114.173.55\",\"externalIp\":\"7.116.186.223\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "101.114.173.55",
"serverIP": "7.116.186.223",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 101.114.173.55
serverIP: 7.116.186.223
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"182.19.9.98\",\"externalIp\":\"113.155.204.82\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "182.19.9.98",
"serverIP": "113.155.204.82",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 182.19.9.98
serverIP: 113.155.204.82
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "jcodesigns.ucoz.com",
"message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"170.101.241.203\",\"externalIp\":\"65.189.126.124\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "jcodesigns.ucoz.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-03-27T13:37:13.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting",
"streamName": "OpenDNS Detection",
"clientIP": "170.101.241.203",
"serverIP": "65.189.126.124",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 170.101.241.203
serverIP: 65.189.126.124
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"20.240.164.1\",\"externalIp\":\"177.94.21.129\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "20.240.164.1",
"serverIP": "177.94.21.129",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 20.240.164.1
serverIP: 177.94.21.129
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"217.184.196.111\",\"externalIp\":\"55.226.97.234\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "217.184.196.111",
"serverIP": "55.226.97.234",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 217.184.196.111
serverIP: 55.226.97.234
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"176.217.94.47\",\"externalIp\":\"174.120.224.180\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "176.217.94.47",
"serverIP": "174.120.224.180",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 176.217.94.47
serverIP: 174.120.224.180
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"223.172.128.196\",\"externalIp\":\"89.235.6.198\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "223.172.128.196",
"serverIP": "89.235.6.198",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.