input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 223.172.128.196
serverIP: 89.235.6.198
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"250.154.197.53\",\"externalIp\":\"187.145.126.228\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "250.154.197.53",
"serverIP": "187.145.126.228",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 250.154.197.53
serverIP: 187.145.126.228
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"167.78.95.50\",\"externalIp\":\"161.175.242.190\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "167.78.95.50",
"serverIP": "161.175.242.190",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 167.78.95.50
serverIP: 161.175.242.190
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.135.161.218\",\"externalIp\":\"70.227.115.78\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "9.135.161.218",
"serverIP": "70.227.115.78",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 9.135.161.218
serverIP: 70.227.115.78
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-04T16:12:01.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"200.221.94.241\",\"externalIp\":\"31.5.173.26\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.clarityacademy.net",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.clarityacademy.net",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "200.221.94.241",
"serverIP": "31.5.173.26",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-04T16:12:01.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.clarityacademy.net
messagetype: firewall_action
severitycode: 2
fqdn: www.clarityacademy.net
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 200.221.94.241
serverIP: 31.5.173.26
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"150.53.192.251\",\"externalIp\":\"219.154.224.161\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "150.53.192.251",
"serverIP": "219.154.224.161",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 150.53.192.251
serverIP: 219.154.224.161
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"27.104.234.20\",\"externalIp\":\"113.50.25.208\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "27.104.234.20",
"serverIP": "113.50.25.208",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 27.104.234.20
serverIP: 113.50.25.208
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"53.141.14.146\",\"externalIp\":\"109.24.146.114\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "53.141.14.146",
"serverIP": "109.24.146.114",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 53.141.14.146
serverIP: 109.24.146.114
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"121.204.207.136\",\"externalIp\":\"202.84.71.221\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "121.204.207.136",
"serverIP": "202.84.71.221",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 121.204.207.136
serverIP: 202.84.71.221
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"87.81.157.89\",\"externalIp\":\"197.45.154.124\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "87.81.157.89",
"serverIP": "197.45.154.124",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 87.81.157.89
serverIP: 197.45.154.124
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-17T18:04:10.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"40.5.19.229\",\"externalIp\":\"71.250.246.93\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.patientportal-login.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.patientportal-login.com",
"vendorcode": "Malware",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.5.19.229",
"serverIP": "71.250.246.93",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-17T18:04:10.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.patientportal-login.com
messagetype: firewall_action
severitycode: 2
fqdn: www.patientportal-login.com
vendorcode: Malware
action: block
streamName: OpenDNS Detection
clientIP: 40.5.19.229
serverIP: 71.250.246.93
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T17:29:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"182.219.215.97\",\"externalIp\":\"78.203.132.154\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"rdr.minerva.luxor.tech\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T17:29:15.000Z\"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "rdr.minerva.luxor.tech",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "rdr.minerva.luxor.tech",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "182.219.215.97",
"serverIP": "78.203.132.154",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T17:29:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: rdr.minerva.luxor.tech
messagetype: firewall_action
severitycode: 2
fqdn: rdr.minerva.luxor.tech
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 182.219.215.97
serverIP: 78.203.132.154
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T17:29:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"3.68.96.90\",\"externalIp\":\"53.243.77.96\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"rdr.minerva.luxor.tech\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T17:29:15.000Z\"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "rdr.minerva.luxor.tech",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "rdr.minerva.luxor.tech",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "3.68.96.90",
"serverIP": "53.243.77.96",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T17:29:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: rdr.minerva.luxor.tech
messagetype: firewall_action
severitycode: 2
fqdn: rdr.minerva.luxor.tech
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 3.68.96.90
serverIP: 53.243.77.96
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"193.56.41.24\",\"externalIp\":\"136.32.187.17\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "193.56.41.24",
"serverIP": "136.32.187.17",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 193.56.41.24
serverIP: 136.32.187.17
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:20.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"124.124.209.198\",\"externalIp\":\"225.211.125.59\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "124.124.209.198",
"serverIP": "225.211.125.59",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:20.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 124.124.209.198
serverIP: 225.211.125.59
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"86.145.246.10\",\"externalIp\":\"38.231.194.99\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "86.145.246.10",
"serverIP": "38.231.194.99",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 86.145.246.10
serverIP: 38.231.194.99
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"12.104.164.46\",\"externalIp\":\"252.126.102.178\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "12.104.164.46",
"serverIP": "252.126.102.178",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 12.104.164.46
serverIP: 252.126.102.178
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"68.107.40.165\",\"externalIp\":\"95.124.94.112\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "68.107.40.165",
"serverIP": "95.124.94.112",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 68.107.40.165
serverIP: 95.124.94.112
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"197.49.68.114\",\"externalIp\":\"28.229.110.60\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "197.49.68.114",
"serverIP": "28.229.110.60",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 197.49.68.114
serverIP: 28.229.110.60
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"210.158.29.202\",\"externalIp\":\"20.226.132.40\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "210.158.29.202",
"serverIP": "20.226.132.40",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 210.158.29.202
serverIP: 20.226.132.40
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-18T01:51:19.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"205.50.95.6\",\"externalIp\":\"125.81.113.149\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "google-font.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "google-font.com",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "205.50.95.6",
"serverIP": "125.81.113.149",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-18T01:51:19.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: google-font.com
messagetype: firewall_action
severitycode: 2
fqdn: google-font.com
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 205.50.95.6
serverIP: 125.81.113.149
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T18:28:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"169.42.191.218\",\"externalIp\":\"36.167.29.239\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "169.42.191.218",
"serverIP": "36.167.29.239",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T18:28:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 169.42.191.218
serverIP: 36.167.29.239
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T18:28:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.36.133.197\",\"externalIp\":\"213.70.215.26\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "44.36.133.197",
"serverIP": "213.70.215.26",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T18:28:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 44.36.133.197
serverIP: 213.70.215.26
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T18:28:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"12.16.25.107\",\"externalIp\":\"142.8.71.200\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "12.16.25.107",
"serverIP": "142.8.71.200",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T18:28:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 12.16.25.107
serverIP: 142.8.71.200
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T18:28:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"53.154.234.210\",\"externalIp\":\"240.81.223.94\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "53.154.234.210",
"serverIP": "240.81.223.94",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T18:28:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 53.154.234.210
serverIP: 240.81.223.94
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"227.0.4.124\",\"externalIp\":\"14.101.22.140\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "227.0.4.124",
"serverIP": "14.101.22.140",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 227.0.4.124
serverIP: 14.101.22.140
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"79.138.186.239\",\"externalIp\":\"90.229.61.155\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "79.138.186.239",
"serverIP": "90.229.61.155",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 79.138.186.239
serverIP: 90.229.61.155
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"246.132.221.164\",\"externalIp\":\"24.54.185.176\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "246.132.221.164",
"serverIP": "24.54.185.176",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 246.132.221.164
serverIP: 24.54.185.176
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-09-20T14:03:48.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"39.139.147.19\",\"externalIp\":\"44.88.235.228\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "url4547.ascnow.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "url4547.ascnow.com",
"vendorcode": "Business ServicesPhishingBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "39.139.147.19",
"serverIP": "44.88.235.228",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-09-20T14:03:48.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: url4547.ascnow.com
messagetype: firewall_action
severitycode: 2
fqdn: url4547.ascnow.com
vendorcode: Business ServicesPhishingBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 39.139.147.19
serverIP: 44.88.235.228
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:26:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"112.67.129.144\",\"externalIp\":\"200.103.22.2\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:26:11.000Z\"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "112.67.129.144",
"serverIP": "200.103.22.2",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:26:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 112.67.129.144
serverIP: 200.103.22.2
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-22T14:26:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"140.154.245.85\",\"externalIp\":\"238.113.67.161\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:26:11.000Z\"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "pocketfaucet.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "pocketfaucet.com",
"vendorcode": "Cryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "140.154.245.85",
"serverIP": "238.113.67.161",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-22T14:26:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: pocketfaucet.com
messagetype: firewall_action
severitycode: 2
fqdn: pocketfaucet.com
vendorcode: Cryptomining
action: block
streamName: OpenDNS Detection
clientIP: 140.154.245.85
serverIP: 238.113.67.161
userName: fish | Explain this syslog message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 2 06:51:17",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0ABC3B594843",
"clientport": 3962,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "148.87.235.0",
"serverIP": "156.83.206.172"
} | Create a JSON artifact from the message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 2 06:51:17
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0ABBAEEE7AE1
clientmac: 0ABC3B594843
clientport: 3962
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 148.87.235.0
serverIP: 156.83.206.172 | Explain this syslog message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position :0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 2 06:51:17",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0ABBAEEE7AE1",
"clientmac": "0ABC3B594843",
"clientport": 3962,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "51.255.149.16",
"serverIP": "212.108.107.190"
} | Create a JSON artifact from the message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 2 06:51:17
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0ABBAEEE7AE1
clientmac: 0ABC3B594843
clientport: 3962
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 51.255.149.16
serverIP: 212.108.107.190 | Explain this syslog message |
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position:0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 2 08:21:46",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0EF282A10881",
"clientmac": "0E2E5A6C69C3",
"clientport": 36140,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "157.114.158.120",
"serverIP": "20.138.79.130"
} | Create a JSON artifact from the message |
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 2 08:21:46
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0EF282A10881
clientmac: 0E2E5A6C69C3
clientport: 36140
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 157.114.158.120
serverIP: 20.138.79.130 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.