input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"181.189.181.229","externalIp":"48.138.125.34","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=181.189.181.229 ::: serverIP=48.138.125.34 ::: userName=johndoe ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:53:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 181.189.181.229 serverIP: 48.138.125.34 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:53:35.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"156.12.106.107\",\"externalIp\":\"198.33.100.216\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:53:35.000Z\"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "156.12.106.107", "serverIP": "198.33.100.216", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"156.12.106.107","externalIp":"198.33.100.216","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-05-26T15:53:35.000Z"} ::: clientIP=156.12.106.107 ::: serverIP=198.33.100.216 ::: userName=alice ::: created_at=2022-05-26T15:53:35.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:53:35.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:53:35.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 156.12.106.107 serverIP: 198.33.100.216 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"90.123.55.16\",\"externalIp\":\"97.201.230.6\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "90.123.55.16", "serverIP": "97.201.230.6", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"90.123.55.16","externalIp":"97.201.230.6","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=90.123.55.16 ::: serverIP=97.201.230.6 ::: userName=fish ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 90.123.55.16 serverIP: 97.201.230.6 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:39.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"116.28.192.134\",\"externalIp\":\"170.194.224.48\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:39.000Z\"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "116.28.192.134", "serverIP": "170.194.224.48", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"116.28.192.134","externalIp":"170.194.224.48","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:39.000Z"} ::: clientIP=116.28.192.134 ::: serverIP=170.194.224.48 ::: userName=bob ::: created_at=2022-05-26T15:38:39.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:39.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:39.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 116.28.192.134 serverIP: 170.194.224.48 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:44:55.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"208.82.88.103\",\"externalIp\":\"233.58.188.98\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "208.82.88.103", "serverIP": "233.58.188.98", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"208.82.88.103","externalIp":"233.58.188.98","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=208.82.88.103 ::: serverIP=233.58.188.98 ::: userName=nighthawk ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:44:55.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 208.82.88.103 serverIP: 233.58.188.98 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:44:55.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"226.232.87.26\",\"externalIp\":\"153.170.153.181\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"ivu.fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:44:55.000Z\"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "ivu.fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "ivu.fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "226.232.87.26", "serverIP": "153.170.153.181", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=ivu.fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"226.232.87.26","externalIp":"153.170.153.181","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"ivu.fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:44:55.000Z"} ::: clientIP=226.232.87.26 ::: serverIP=153.170.153.181 ::: userName=fish ::: created_at=2022-05-26T15:44:55.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:44:55.000Z ::: serverHostname=ivu.fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:44:55.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: ivu.fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: ivu.fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 226.232.87.26 serverIP: 153.170.153.181 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-25T09:24:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"170.14.225.80\",\"externalIp\":\"137.13.144.12\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "170.14.225.80", "serverIP": "137.13.144.12", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"170.14.225.80","externalIp":"137.13.144.12","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=170.14.225.80 ::: serverIP=137.13.144.12 ::: userName=bob ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-25T09:24:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 170.14.225.80 serverIP: 137.13.144.12 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-25T09:24:49.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"29.57.88.214\",\"externalIp\":\"64.179.198.70\",\"categories\":[\"Phishing\"],\"tags\":[],\"destination\":\"flint.defybrick.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-25T09:24:49.000Z\"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "flint.defybrick.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "flint.defybrick.com", "vendorcode": "Phishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "29.57.88.214", "serverIP": "64.179.198.70", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=flint.defybrick.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"29.57.88.214","externalIp":"64.179.198.70","categories":["Phishing"],"tags":[],"destination":"flint.defybrick.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-25T09:24:49.000Z"} ::: clientIP=29.57.88.214 ::: serverIP=64.179.198.70 ::: userName=johndoe ::: created_at=2022-05-25T09:24:49.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Phishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-25T09:24:49.000Z ::: serverHostname=flint.defybrick.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-25T09:24:49.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: flint.defybrick.com messagetype: firewall_action severitycode: 2 fqdn: flint.defybrick.com vendorcode: Phishing action: block streamName: OpenDNS Detection clientIP: 29.57.88.214 serverIP: 64.179.198.70 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"116.122.56.203\",\"externalIp\":\"223.7.167.151\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "116.122.56.203", "serverIP": "223.7.167.151", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"116.122.56.203","externalIp":"223.7.167.151","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=116.122.56.203 ::: serverIP=223.7.167.151 ::: userName=johndoe ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 116.122.56.203 serverIP: 223.7.167.151 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"69.121.26.27\",\"externalIp\":\"66.119.51.113\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "69.121.26.27", "serverIP": "66.119.51.113", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"69.121.26.27","externalIp":"66.119.51.113","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=69.121.26.27 ::: serverIP=66.119.51.113 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 69.121.26.27 serverIP: 66.119.51.113 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"115.206.58.210\",\"externalIp\":\"231.186.150.10\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "115.206.58.210", "serverIP": "231.186.150.10", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"115.206.58.210","externalIp":"231.186.150.10","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=115.206.58.210 ::: serverIP=231.186.150.10 ::: userName=johndoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 115.206.58.210 serverIP: 231.186.150.10 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"164.196.117.25\",\"externalIp\":\"109.67.3.145\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "164.196.117.25", "serverIP": "109.67.3.145", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"164.196.117.25","externalIp":"109.67.3.145","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=164.196.117.25 ::: serverIP=109.67.3.145 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 164.196.117.25 serverIP: 109.67.3.145 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"38.115.100.180\",\"externalIp\":\"89.156.238.241\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "38.115.100.180", "serverIP": "89.156.238.241", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"38.115.100.180","externalIp":"89.156.238.241","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=38.115.100.180 ::: serverIP=89.156.238.241 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 38.115.100.180 serverIP: 89.156.238.241 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"241.85.89.97\",\"externalIp\":\"34.17.80.125\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "241.85.89.97", "serverIP": "34.17.80.125", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"241.85.89.97","externalIp":"34.17.80.125","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=241.85.89.97 ::: serverIP=34.17.80.125 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 241.85.89.97 serverIP: 34.17.80.125 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"44.169.228.137\",\"externalIp\":\"127.6.169.224\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "44.169.228.137", "serverIP": "127.6.169.224", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"44.169.228.137","externalIp":"127.6.169.224","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=44.169.228.137 ::: serverIP=127.6.169.224 ::: userName=bob ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 44.169.228.137 serverIP: 127.6.169.224 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":524252163,\"originType\":\"AD Users\",\"internalIp\":\"188.41.18.86\",\"externalIp\":\"127.49.182.148\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:13.000Z\"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "188.41.18.86", "serverIP": "127.49.182.148", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":524252163,"originType":"AD Users","internalIp":"188.41.18.86","externalIp":"127.49.182.148","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:13.000Z"} ::: clientIP=188.41.18.86 ::: serverIP=127.49.182.148 ::: userName=fish ::: created_at=2022-06-03T19:59:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:13.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 188.41.18.86 serverIP: 127.49.182.148 userName: fish
Explain this syslog message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204
{ "senderhost": "10.19.251.5", "serverport": 53, "severitylabel": "informational", "tags": [ "rfc3164", "juniper_srx", "routing_info" ], "productids": [ 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204", "action": "block", "localstarttime": "Mar 26 01:55:39", "sensitivity": "normal", "application": "junos-dns-udp", "rulename": "DENY", "program": "RT_FLOW", "localhostname": "aurdcfwj1-s", "priority": 14, "facilitylabel": "user-level", "messagetype": "routing_info", "clientport": 51839, "protocol": 17, "facilitycode": 1, "streamName": "juniper_srx", "clientIP": "170.228.250.104", "serverIP": "35.81.123.133", "userName": "nighthawk" }
Create a JSON artifact from the message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204
Product: Juniper FW Vendor: Juniper
Identify this syslog message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 170.228.250.104/51839->35.81.123.133/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN nighthawk reth3.204
This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message: senderhost: 10.19.251.5 serverport: 53 severitylabel: informational tags: ['rfc3164', 'juniper_srx', 'routing_info'] productids: [0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Mar 26 01:55:39 sensitivity: normal application: junos-dns-udp rulename: DENY program: RT_FLOW localhostname: aurdcfwj1-s priority: 14 facilitylabel: user-level messagetype: routing_info clientport: 51839 protocol: 17 facilitycode: 1 streamName: juniper_srx clientIP: 170.228.250.104 serverIP: 35.81.123.133 userName: nighthawk
Explain this syslog message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204
{ "senderhost": "10.19.251.5", "serverport": 53, "severitylabel": "informational", "tags": [ "rfc3164", "juniper_srx", "routing_info" ], "productids": [ 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204", "action": "block", "localstarttime": "Mar 26 01:55:39", "sensitivity": "normal", "application": "junos-dns-udp", "rulename": "DENY", "program": "RT_FLOW", "localhostname": "aurdcfwj1-s", "priority": 14, "facilitylabel": "user-level", "messagetype": "routing_info", "clientport": 51839, "protocol": 17, "facilitycode": 1, "streamName": "juniper_srx", "clientIP": "44.58.234.209", "serverIP": "62.134.222.21", "userName": "johndoe" }
Create a JSON artifact from the message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204
Product: Juniper FW Vendor: Juniper
Identify this syslog message
<14>Mar 26 01:55:39 aurdcfwj1-s RT_FLOW: RT_FLOW_SESSION_DENY: session denied 44.58.234.209/51839->62.134.222.21/53 junos-dns-udp 17(0) DENY vrf-tis-pdz2 vrf-corp-intsec UNKNOWN UNKNOWN johndoe reth3.204
This is a syslog message from a product called Juniper FW by Juniper. The following fields were extracted from the message: senderhost: 10.19.251.5 serverport: 53 severitylabel: informational tags: ['rfc3164', 'juniper_srx', 'routing_info'] productids: [0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Mar 26 01:55:39 sensitivity: normal application: junos-dns-udp rulename: DENY program: RT_FLOW localhostname: aurdcfwj1-s priority: 14 facilitylabel: user-level messagetype: routing_info clientport: 51839 protocol: 17 facilitycode: 1 streamName: juniper_srx clientIP: 44.58.234.209 serverIP: 62.134.222.21 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"193.123.205.168\",\"externalIp\":\"193.123.205.168\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "193.123.205.168", "serverIP": "36.21.223.224", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"193.123.205.168","externalIp":"193.123.205.168","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=193.123.205.168 ::: serverIP=193.123.205.168 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 193.123.205.168 serverIP: 36.21.223.224 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"212.187.33.121\",\"externalIp\":\"212.187.33.121\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "212.187.33.121", "serverIP": "203.84.251.33", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"212.187.33.121","externalIp":"212.187.33.121","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=212.187.33.121 ::: serverIP=212.187.33.121 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 212.187.33.121 serverIP: 203.84.251.33 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"130.179.5.33\",\"externalIp\":\"130.179.5.33\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "130.179.5.33", "serverIP": "145.218.109.144", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"130.179.5.33","externalIp":"130.179.5.33","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=130.179.5.33 ::: serverIP=130.179.5.33 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 130.179.5.33 serverIP: 145.218.109.144 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"218.102.144.110\",\"externalIp\":\"218.102.144.110\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "218.102.144.110", "serverIP": "78.242.163.254", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"218.102.144.110","externalIp":"218.102.144.110","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=218.102.144.110 ::: serverIP=218.102.144.110 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 218.102.144.110 serverIP: 78.242.163.254 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"70.105.245.11\",\"externalIp\":\"70.105.245.11\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "70.105.245.11", "serverIP": "53.53.89.138", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"70.105.245.11","externalIp":"70.105.245.11","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=70.105.245.11 ::: serverIP=70.105.245.11 ::: userName=fish ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 70.105.245.11 serverIP: 53.53.89.138 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"119.140.49.240\",\"externalIp\":\"119.140.49.240\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "119.140.49.240", "serverIP": "193.246.226.205", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"119.140.49.240","externalIp":"119.140.49.240","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=119.140.49.240 ::: serverIP=119.140.49.240 ::: userName=charlie ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 119.140.49.240 serverIP: 193.246.226.205 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"39.217.153.41\",\"externalIp\":\"85.235.139.104\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "39.217.153.41", "serverIP": "85.235.139.104", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"39.217.153.41","externalIp":"85.235.139.104","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=39.217.153.41 ::: serverIP=85.235.139.104 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 39.217.153.41 serverIP: 85.235.139.104 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"112.151.58.134\",\"externalIp\":\"183.151.212.179\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "112.151.58.134", "serverIP": "183.151.212.179", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"112.151.58.134","externalIp":"183.151.212.179","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=112.151.58.134 ::: serverIP=183.151.212.179 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 112.151.58.134 serverIP: 183.151.212.179 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"15.132.145.228\",\"externalIp\":\"197.252.178.132\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "15.132.145.228", "serverIP": "197.252.178.132", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"15.132.145.228","externalIp":"197.252.178.132","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=15.132.145.228 ::: serverIP=197.252.178.132 ::: userName=fish ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 15.132.145.228 serverIP: 197.252.178.132 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"101.114.173.55\",\"externalIp\":\"7.116.186.223\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "101.114.173.55", "serverIP": "7.116.186.223", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"101.114.173.55","externalIp":"7.116.186.223","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=101.114.173.55 ::: serverIP=7.116.186.223 ::: userName=janedoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 101.114.173.55 serverIP: 7.116.186.223 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"182.19.9.98\",\"externalIp\":\"113.155.204.82\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "182.19.9.98", "serverIP": "113.155.204.82", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"182.19.9.98","externalIp":"113.155.204.82","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=182.19.9.98 ::: serverIP=113.155.204.82 ::: userName=alice ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 182.19.9.98 serverIP: 113.155.204.82 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "jcodesigns.ucoz.com", "message": "WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"170.101.241.203\",\"externalIp\":\"65.189.126.124\",\"categories\":[\"File Storage\",\"Software/Technology\",\"Malware\",\"Web Hosting\"],\"tags\":[],\"destination\":\"jcodesigns.ucoz.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-27T13:37:13.000Z\"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "jcodesigns.ucoz.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-03-27T13:37:13.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "File StorageSoftware/TechnologyMalwareWeb Hosting", "streamName": "OpenDNS Detection", "clientIP": "170.101.241.203", "serverIP": "65.189.126.124", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"170.101.241.203","externalIp":"65.189.126.124","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=170.101.241.203 ::: serverIP=65.189.126.124 ::: userName=nighthawk ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 170.101.241.203 serverIP: 65.189.126.124 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"20.240.164.1\",\"externalIp\":\"177.94.21.129\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "20.240.164.1", "serverIP": "177.94.21.129", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"20.240.164.1","externalIp":"177.94.21.129","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=20.240.164.1 ::: serverIP=177.94.21.129 ::: userName=bob ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 20.240.164.1 serverIP: 177.94.21.129 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"217.184.196.111\",\"externalIp\":\"55.226.97.234\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "217.184.196.111", "serverIP": "55.226.97.234", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"217.184.196.111","externalIp":"55.226.97.234","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=217.184.196.111 ::: serverIP=55.226.97.234 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 217.184.196.111 serverIP: 55.226.97.234 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"176.217.94.47\",\"externalIp\":\"174.120.224.180\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "176.217.94.47", "serverIP": "174.120.224.180", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"176.217.94.47","externalIp":"174.120.224.180","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=176.217.94.47 ::: serverIP=174.120.224.180 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 176.217.94.47 serverIP: 174.120.224.180 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"223.172.128.196\",\"externalIp\":\"89.235.6.198\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "223.172.128.196", "serverIP": "89.235.6.198", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message