input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"223.172.128.196","externalIp":"89.235.6.198","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=223.172.128.196 ::: serverIP=89.235.6.198 ::: userName=charlie ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 223.172.128.196 serverIP: 89.235.6.198 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T16:12:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"250.154.197.53\",\"externalIp\":\"187.145.126.228\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.clarityacademy.net", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.clarityacademy.net", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "250.154.197.53", "serverIP": "187.145.126.228", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"250.154.197.53","externalIp":"187.145.126.228","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=250.154.197.53 ::: serverIP=187.145.126.228 ::: userName=bob ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T16:12:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.clarityacademy.net messagetype: firewall_action severitycode: 2 fqdn: www.clarityacademy.net vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 250.154.197.53 serverIP: 187.145.126.228 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T16:12:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"167.78.95.50\",\"externalIp\":\"161.175.242.190\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.clarityacademy.net", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.clarityacademy.net", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "167.78.95.50", "serverIP": "161.175.242.190", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"167.78.95.50","externalIp":"161.175.242.190","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=167.78.95.50 ::: serverIP=161.175.242.190 ::: userName=fish ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T16:12:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.clarityacademy.net messagetype: firewall_action severitycode: 2 fqdn: www.clarityacademy.net vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 167.78.95.50 serverIP: 161.175.242.190 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T16:12:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"9.135.161.218\",\"externalIp\":\"70.227.115.78\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.clarityacademy.net", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.clarityacademy.net", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "9.135.161.218", "serverIP": "70.227.115.78", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"9.135.161.218","externalIp":"70.227.115.78","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=9.135.161.218 ::: serverIP=70.227.115.78 ::: userName=charlie ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T16:12:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.clarityacademy.net messagetype: firewall_action severitycode: 2 fqdn: www.clarityacademy.net vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 9.135.161.218 serverIP: 70.227.115.78 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-04T16:12:01.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"200.221.94.241\",\"externalIp\":\"31.5.173.26\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.clarityacademy.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-04T16:12:01.000Z\"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.clarityacademy.net", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.clarityacademy.net", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "200.221.94.241", "serverIP": "31.5.173.26", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.clarityacademy.net ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"200.221.94.241","externalIp":"31.5.173.26","categories":["Malware"],"tags":[],"destination":"www.clarityacademy.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-04T16:12:01.000Z"} ::: clientIP=200.221.94.241 ::: serverIP=31.5.173.26 ::: userName=johndoe ::: created_at=2022-08-04T16:12:01.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-04T16:12:01.000Z ::: serverHostname=www.clarityacademy.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-04T16:12:01.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.clarityacademy.net messagetype: firewall_action severitycode: 2 fqdn: www.clarityacademy.net vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 200.221.94.241 serverIP: 31.5.173.26 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"150.53.192.251\",\"externalIp\":\"219.154.224.161\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "150.53.192.251", "serverIP": "219.154.224.161", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"150.53.192.251","externalIp":"219.154.224.161","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=150.53.192.251 ::: serverIP=219.154.224.161 ::: userName=alice ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 150.53.192.251 serverIP: 219.154.224.161 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"27.104.234.20\",\"externalIp\":\"113.50.25.208\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "27.104.234.20", "serverIP": "113.50.25.208", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"27.104.234.20","externalIp":"113.50.25.208","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=27.104.234.20 ::: serverIP=113.50.25.208 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 27.104.234.20 serverIP: 113.50.25.208 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"53.141.14.146\",\"externalIp\":\"109.24.146.114\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "53.141.14.146", "serverIP": "109.24.146.114", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"53.141.14.146","externalIp":"109.24.146.114","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=53.141.14.146 ::: serverIP=109.24.146.114 ::: userName=fish ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 53.141.14.146 serverIP: 109.24.146.114 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"121.204.207.136\",\"externalIp\":\"202.84.71.221\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "121.204.207.136", "serverIP": "202.84.71.221", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"121.204.207.136","externalIp":"202.84.71.221","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=121.204.207.136 ::: serverIP=202.84.71.221 ::: userName=janedoe ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 121.204.207.136 serverIP: 202.84.71.221 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"87.81.157.89\",\"externalIp\":\"197.45.154.124\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "87.81.157.89", "serverIP": "197.45.154.124", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"87.81.157.89","externalIp":"197.45.154.124","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=87.81.157.89 ::: serverIP=197.45.154.124 ::: userName=charlie ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 87.81.157.89 serverIP: 197.45.154.124 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-17T18:04:10.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"40.5.19.229\",\"externalIp\":\"71.250.246.93\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"www.patientportal-login.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-17T18:04:10.000Z\"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.patientportal-login.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.patientportal-login.com", "vendorcode": "Malware", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "40.5.19.229", "serverIP": "71.250.246.93", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.patientportal-login.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"40.5.19.229","externalIp":"71.250.246.93","categories":["Malware"],"tags":[],"destination":"www.patientportal-login.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-17T18:04:10.000Z"} ::: clientIP=40.5.19.229 ::: serverIP=71.250.246.93 ::: userName=bob ::: created_at=2022-08-17T18:04:10.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-17T18:04:10.000Z ::: serverHostname=www.patientportal-login.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-17T18:04:10.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.patientportal-login.com messagetype: firewall_action severitycode: 2 fqdn: www.patientportal-login.com vendorcode: Malware action: block streamName: OpenDNS Detection clientIP: 40.5.19.229 serverIP: 71.250.246.93 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T17:29:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"182.219.215.97\",\"externalIp\":\"78.203.132.154\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"rdr.minerva.luxor.tech\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T17:29:15.000Z\"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "rdr.minerva.luxor.tech", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "rdr.minerva.luxor.tech", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "182.219.215.97", "serverIP": "78.203.132.154", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"182.219.215.97","externalIp":"78.203.132.154","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=182.219.215.97 ::: serverIP=78.203.132.154 ::: userName=nighthawk ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T17:29:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: rdr.minerva.luxor.tech messagetype: firewall_action severitycode: 2 fqdn: rdr.minerva.luxor.tech vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 182.219.215.97 serverIP: 78.203.132.154 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T17:29:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"3.68.96.90\",\"externalIp\":\"53.243.77.96\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"rdr.minerva.luxor.tech\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T17:29:15.000Z\"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "rdr.minerva.luxor.tech", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "rdr.minerva.luxor.tech", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "3.68.96.90", "serverIP": "53.243.77.96", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=rdr.minerva.luxor.tech ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"3.68.96.90","externalIp":"53.243.77.96","categories":["Cryptomining"],"tags":[],"destination":"rdr.minerva.luxor.tech","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T17:29:15.000Z"} ::: clientIP=3.68.96.90 ::: serverIP=53.243.77.96 ::: userName=alice ::: created_at=2022-08-18T17:29:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T17:29:15.000Z ::: serverHostname=rdr.minerva.luxor.tech ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T17:29:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: rdr.minerva.luxor.tech messagetype: firewall_action severitycode: 2 fqdn: rdr.minerva.luxor.tech vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 3.68.96.90 serverIP: 53.243.77.96 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"193.56.41.24\",\"externalIp\":\"136.32.187.17\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "193.56.41.24", "serverIP": "136.32.187.17", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.56.41.24","externalIp":"136.32.187.17","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=193.56.41.24 ::: serverIP=136.32.187.17 ::: userName=alice ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 193.56.41.24 serverIP: 136.32.187.17 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:20.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"124.124.209.198\",\"externalIp\":\"225.211.125.59\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:20.000Z\"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "124.124.209.198", "serverIP": "225.211.125.59", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"124.124.209.198","externalIp":"225.211.125.59","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:20.000Z"} ::: clientIP=124.124.209.198 ::: serverIP=225.211.125.59 ::: userName=fish ::: created_at=2022-08-18T01:51:20.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:20.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:20.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 124.124.209.198 serverIP: 225.211.125.59 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"86.145.246.10\",\"externalIp\":\"38.231.194.99\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "86.145.246.10", "serverIP": "38.231.194.99", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"86.145.246.10","externalIp":"38.231.194.99","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=86.145.246.10 ::: serverIP=38.231.194.99 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 86.145.246.10 serverIP: 38.231.194.99 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"12.104.164.46\",\"externalIp\":\"252.126.102.178\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "12.104.164.46", "serverIP": "252.126.102.178", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"12.104.164.46","externalIp":"252.126.102.178","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=12.104.164.46 ::: serverIP=252.126.102.178 ::: userName=charlie ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 12.104.164.46 serverIP: 252.126.102.178 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"68.107.40.165\",\"externalIp\":\"95.124.94.112\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "68.107.40.165", "serverIP": "95.124.94.112", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"68.107.40.165","externalIp":"95.124.94.112","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=68.107.40.165 ::: serverIP=95.124.94.112 ::: userName=bob ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 68.107.40.165 serverIP: 95.124.94.112 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"197.49.68.114\",\"externalIp\":\"28.229.110.60\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "197.49.68.114", "serverIP": "28.229.110.60", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"197.49.68.114","externalIp":"28.229.110.60","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=197.49.68.114 ::: serverIP=28.229.110.60 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 197.49.68.114 serverIP: 28.229.110.60 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"210.158.29.202\",\"externalIp\":\"20.226.132.40\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "210.158.29.202", "serverIP": "20.226.132.40", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"210.158.29.202","externalIp":"20.226.132.40","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=210.158.29.202 ::: serverIP=20.226.132.40 ::: userName=nighthawk ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 210.158.29.202 serverIP: 20.226.132.40 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-18T01:51:19.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={\"originId\":410613832,\"originType\":\"AD Users\",\"internalIp\":\"205.50.95.6\",\"externalIp\":\"125.81.113.149\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"google-font.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-18T01:51:19.000Z\"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "google-font.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "google-font.com", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "205.50.95.6", "serverIP": "125.81.113.149", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=google-font.com ::: action=BLOCKED ::: message={"originId":410613832,"originType":"AD Users","internalIp":"205.50.95.6","externalIp":"125.81.113.149","categories":["Malware","Not Actionable"],"tags":[],"destination":"google-font.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-18T01:51:19.000Z"} ::: clientIP=205.50.95.6 ::: serverIP=125.81.113.149 ::: userName=fish ::: created_at=2022-08-18T01:51:19.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-18T01:51:19.000Z ::: serverHostname=google-font.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-18T01:51:19.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: google-font.com messagetype: firewall_action severitycode: 2 fqdn: google-font.com vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 205.50.95.6 serverIP: 125.81.113.149 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T18:28:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"169.42.191.218\",\"externalIp\":\"36.167.29.239\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "169.42.191.218", "serverIP": "36.167.29.239", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"169.42.191.218","externalIp":"36.167.29.239","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=169.42.191.218 ::: serverIP=36.167.29.239 ::: userName=johndoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T18:28:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 169.42.191.218 serverIP: 36.167.29.239 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T18:28:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"44.36.133.197\",\"externalIp\":\"213.70.215.26\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "44.36.133.197", "serverIP": "213.70.215.26", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"44.36.133.197","externalIp":"213.70.215.26","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=44.36.133.197 ::: serverIP=213.70.215.26 ::: userName=janedoe ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T18:28:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 44.36.133.197 serverIP: 213.70.215.26 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T18:28:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"12.16.25.107\",\"externalIp\":\"142.8.71.200\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "12.16.25.107", "serverIP": "142.8.71.200", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"12.16.25.107","externalIp":"142.8.71.200","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=12.16.25.107 ::: serverIP=142.8.71.200 ::: userName=nighthawk ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T18:28:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 12.16.25.107 serverIP: 142.8.71.200 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T18:28:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"53.154.234.210\",\"externalIp\":\"240.81.223.94\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T18:28:15.000Z\"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "53.154.234.210", "serverIP": "240.81.223.94", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"53.154.234.210","externalIp":"240.81.223.94","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-09-20T18:28:15.000Z"} ::: clientIP=53.154.234.210 ::: serverIP=240.81.223.94 ::: userName=charlie ::: created_at=2022-09-20T18:28:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T18:28:15.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T18:28:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 53.154.234.210 serverIP: 240.81.223.94 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"227.0.4.124\",\"externalIp\":\"14.101.22.140\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "227.0.4.124", "serverIP": "14.101.22.140", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"227.0.4.124","externalIp":"14.101.22.140","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=227.0.4.124 ::: serverIP=14.101.22.140 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 227.0.4.124 serverIP: 14.101.22.140 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"79.138.186.239\",\"externalIp\":\"90.229.61.155\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "79.138.186.239", "serverIP": "90.229.61.155", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"79.138.186.239","externalIp":"90.229.61.155","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=79.138.186.239 ::: serverIP=90.229.61.155 ::: userName=fish ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 79.138.186.239 serverIP: 90.229.61.155 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"246.132.221.164\",\"externalIp\":\"24.54.185.176\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "246.132.221.164", "serverIP": "24.54.185.176", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"246.132.221.164","externalIp":"24.54.185.176","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=246.132.221.164 ::: serverIP=24.54.185.176 ::: userName=nighthawk ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 246.132.221.164 serverIP: 24.54.185.176 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-09-20T14:03:48.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"39.139.147.19\",\"externalIp\":\"44.88.235.228\",\"categories\":[\"Business Services\",\"Phishing\",\"Business and Industry\"],\"tags\":[],\"destination\":\"url4547.ascnow.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-09-20T14:03:48.000Z\"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "url4547.ascnow.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "url4547.ascnow.com", "vendorcode": "Business ServicesPhishingBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "39.139.147.19", "serverIP": "44.88.235.228", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=url4547.ascnow.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"39.139.147.19","externalIp":"44.88.235.228","categories":["Business Services","Phishing","Business and Industry"],"tags":[],"destination":"url4547.ascnow.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-09-20T14:03:48.000Z"} ::: clientIP=39.139.147.19 ::: serverIP=44.88.235.228 ::: userName=alice ::: created_at=2022-09-20T14:03:48.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPhishingBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-09-20T14:03:48.000Z ::: serverHostname=url4547.ascnow.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-09-20T14:03:48.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: url4547.ascnow.com messagetype: firewall_action severitycode: 2 fqdn: url4547.ascnow.com vendorcode: Business ServicesPhishingBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 39.139.147.19 serverIP: 44.88.235.228 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:26:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"112.67.129.144\",\"externalIp\":\"200.103.22.2\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:26:11.000Z\"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "112.67.129.144", "serverIP": "200.103.22.2", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"112.67.129.144","externalIp":"200.103.22.2","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=112.67.129.144 ::: serverIP=200.103.22.2 ::: userName=nighthawk ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:26:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 112.67.129.144 serverIP: 200.103.22.2 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-22T14:26:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"140.154.245.85\",\"externalIp\":\"238.113.67.161\",\"categories\":[\"Cryptomining\"],\"tags\":[],\"destination\":\"pocketfaucet.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-22T14:26:11.000Z\"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "pocketfaucet.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "pocketfaucet.com", "vendorcode": "Cryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "140.154.245.85", "serverIP": "238.113.67.161", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=pocketfaucet.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"140.154.245.85","externalIp":"238.113.67.161","categories":["Cryptomining"],"tags":[],"destination":"pocketfaucet.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-22T14:26:11.000Z"} ::: clientIP=140.154.245.85 ::: serverIP=238.113.67.161 ::: userName=fish ::: created_at=2022-07-22T14:26:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Cryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-22T14:26:11.000Z ::: serverHostname=pocketfaucet.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-22T14:26:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: pocketfaucet.com messagetype: firewall_action severitycode: 2 fqdn: pocketfaucet.com vendorcode: Cryptomining action: block streamName: OpenDNS Detection clientIP: 140.154.245.85 serverIP: 238.113.67.161 userName: fish
Explain this syslog message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 2 06:51:17", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0ABBAEEE7AE1", "clientmac": "0ABC3B594843", "clientport": 3962, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "148.87.235.0", "serverIP": "156.83.206.172" }
Create a JSON artifact from the message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=156.83.206.172 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=148.87.235.0 dst=156.83.206.172 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 2 06:51:17 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0ABBAEEE7AE1 clientmac: 0ABC3B594843 clientport: 3962 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 148.87.235.0 serverIP: 156.83.206.172
Explain this syslog message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "DPI Note:HTTPTraffic", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position :0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 2 06:51:17", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0ABBAEEE7AE1", "clientmac": "0ABC3B594843", "clientport": 3962, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "51.255.149.16", "serverIP": "212.108.107.190" }
Create a JSON artifact from the message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 2 06:51:17 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=212.108.107.190 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:BC:3B:59:48:43 TrendMicroDsFrameType=IP src=51.255.149.16 dst=212.108.107.190 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=3962 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=142 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 2 06:51:17 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0ABBAEEE7AE1 clientmac: 0ABC3B594843 clientport: 3962 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 51.255.149.16 serverIP: 212.108.107.190
Explain this syslog message
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position:0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 2 08:21:46", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0EF282A10881", "clientmac": "0E2E5A6C69C3", "clientport": 36140, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "157.114.158.120", "serverIP": "20.138.79.130" }
Create a JSON artifact from the message
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=20.138.79.130 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=157.114.158.120 dst=20.138.79.130 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 2 08:21:46 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0EF282A10881 clientmac: 0E2E5A6C69C3 clientport: 36140 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 157.114.158.120 serverIP: 20.138.79.130
Explain this syslog message