input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
{ "senderhost": "34.205.5.2", "serverport": 443, "severitylabel": "critical", "tags": [ "TCP Flags:ACK PSH", "trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels", "Detected HTTP Traffic Over Secured HTTPS Channels", "rfc3164", "Fragmentation Bits:DF 0", "cef", "DPI Flags:0", "trend micro_deep security agent", "DPI Stream Position:0" ], "productids": [ 30 ], "severitycode": 2, "sourceinfo": "unknown", "message": "<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags", "localstarttime": "Oct 2 08:21:46", "sensitivity": "normal", "localhostname": "deepsecurity", "priority": 134, "facilitylabel": "local0", "messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels", "servermac": "0EF282A10881", "clientmac": "0E2E5A6C69C3", "clientport": 36140, "vendorcode": "1003305", "action": "IDS:Reset", "protocol": 6, "facilitycode": 16, "streamName": "trend micro_deep security agent", "clientIP": "67.176.193.4", "serverIP": "155.238.161.28" }
Create a JSON artifact from the message
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Oct 2 08:21:46 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0EF282A10881 clientmac: 0E2E5A6C69C3 clientport: 36140 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 67.176.193.4 serverIP: 155.238.161.28
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"89.109.254.242\",\"externalIp\":\"169.69.123.110\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "89.109.254.242", "serverIP": "169.69.123.110", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 89.109.254.242 serverIP: 169.69.123.110 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"197.60.73.216\",\"externalIp\":\"170.251.228.218\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "197.60.73.216", "serverIP": "170.251.228.218", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 197.60.73.216 serverIP: 170.251.228.218 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"185.79.2.57\",\"externalIp\":\"31.190.53.86\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "185.79.2.57", "serverIP": "31.190.53.86", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 185.79.2.57 serverIP: 31.190.53.86 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"115.13.201.230\",\"externalIp\":\"187.191.206.124\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "115.13.201.230", "serverIP": "187.191.206.124", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 115.13.201.230 serverIP: 187.191.206.124 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"193.187.237.115\",\"externalIp\":\"119.67.211.52\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "193.187.237.115", "serverIP": "119.67.211.52", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 193.187.237.115 serverIP: 119.67.211.52 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-07-28T16:39:37.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"99.150.56.77\",\"externalIp\":\"231.1.64.72\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "captcha4you.top", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "captcha4you.top", "vendorcode": "MalwareNot Actionable", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "99.150.56.77", "serverIP": "231.1.64.72", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-07-28T16:39:37.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: captcha4you.top messagetype: firewall_action severitycode: 2 fqdn: captcha4you.top vendorcode: MalwareNot Actionable action: block streamName: OpenDNS Detection clientIP: 99.150.56.77 serverIP: 231.1.64.72 userName: bob
Explain this syslog message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
{ "action": "block", "clientbytes": 26899, "clientport": 56396, "facilitylabel": "kernel", "localhostname": "hq-ie001", "localstarttime": "Jun 19 20:06:20", "message": "<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 ", "messagetype": "firewall_action", "priority": 4, "program": "kernel", "protocol": 6, "senderhost": "10.1.100.159", "sensitivity": "normal", "serverport": 9042, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "rfc3164", "ufw", "firewall_action" ], "streamName": "ufw", "clientIP": "145.87.60.80", "serverIP": "31.241.42.19" }
Create a JSON artifact from the message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
Product: Uncomplicated Firewall (UFW) Vendor: linux
Identify this syslog message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message: action: block clientbytes: 26899 clientport: 56396 facilitylabel: kernel localhostname: hq-ie001 localstarttime: Jun 19 20:06:20 messagetype: firewall_action priority: 4 program: kernel protocol: 6 senderhost: 10.1.100.159 sensitivity: normal serverport: 9042 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['rfc3164', 'ufw', 'firewall_action'] streamName: ufw clientIP: 145.87.60.80 serverIP: 31.241.42.19
Explain this syslog message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
{ "action": "block", "clientbytes": 26899, "clientport": 56396, "facilitylabel": "kernel", "localhostname": "hq-ie001", "localstarttime": "Jun 19 20:06:20", "message": "<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 ", "messagetype": "firewall_action", "priority": 4, "program": "kernel", "protocol": 6, "senderhost": "10.1.100.159", "sensitivity": "normal", "serverport": 9042, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "rfc3164", "ufw", "firewall_action" ], "streamName": "ufw", "clientIP": "171.52.75.226", "serverIP": "18.51.107.23" }
Create a JSON artifact from the message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
Product: Uncomplicated Firewall (UFW) Vendor: linux
Identify this syslog message
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0
This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message: action: block clientbytes: 26899 clientport: 56396 facilitylabel: kernel localhostname: hq-ie001 localstarttime: Jun 19 20:06:20 messagetype: firewall_action priority: 4 program: kernel protocol: 6 senderhost: 10.1.100.159 sensitivity: normal serverport: 9042 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['rfc3164', 'ufw', 'firewall_action'] streamName: ufw clientIP: 171.52.75.226 serverIP: 18.51.107.23
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"165.235.228.166\",\"externalIp\":\"8.123.8.65\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "165.235.228.166", "serverIP": "8.123.8.65", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 165.235.228.166 serverIP: 8.123.8.65 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"62.224.234.252\",\"externalIp\":\"111.211.109.118\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "62.224.234.252", "serverIP": "111.211.109.118", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 62.224.234.252 serverIP: 111.211.109.118 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"11.53.94.159\",\"externalIp\":\"29.150.213.46\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "11.53.94.159", "serverIP": "29.150.213.46", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 11.53.94.159 serverIP: 29.150.213.46 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"37.144.149.160\",\"externalIp\":\"172.243.166.39\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "37.144.149.160", "serverIP": "172.243.166.39", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 37.144.149.160 serverIP: 172.243.166.39 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"78.117.71.91\",\"externalIp\":\"201.168.55.222\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "78.117.71.91", "serverIP": "201.168.55.222", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 78.117.71.91 serverIP: 201.168.55.222 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"220.209.163.66\",\"externalIp\":\"230.34.92.233\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "220.209.163.66", "serverIP": "230.34.92.233", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 220.209.163.66 serverIP: 230.34.92.233 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-20T16:11:50.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"8.215.201.102\",\"externalIp\":\"45.149.206.110\",\"categories\":[\"Ecommerce/Shopping\",\"Malware\",\"Shopping\"],\"tags\":[],\"destination\":\"www.gumballs.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-20T16:11:50.000Z\"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.gumballs.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.gumballs.com", "vendorcode": "Ecommerce/ShoppingMalwareShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "8.215.201.102", "serverIP": "45.149.206.110", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-20T16:11:50.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.gumballs.com messagetype: firewall_action severitycode: 2 fqdn: www.gumballs.com vendorcode: Ecommerce/ShoppingMalwareShopping action: block streamName: OpenDNS Detection clientIP: 8.215.201.102 serverIP: 45.149.206.110 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-20T16:11:50.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"150.36.177.37\",\"externalIp\":\"28.15.85.198\",\"categories\":[\"Ecommerce/Shopping\",\"Malware\",\"Shopping\"],\"tags\":[],\"destination\":\"www.gumballs.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-20T16:11:50.000Z\"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.gumballs.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.gumballs.com", "vendorcode": "Ecommerce/ShoppingMalwareShopping", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "150.36.177.37", "serverIP": "28.15.85.198", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-20T16:11:50.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.gumballs.com messagetype: firewall_action severitycode: 2 fqdn: www.gumballs.com vendorcode: Ecommerce/ShoppingMalwareShopping action: block streamName: OpenDNS Detection clientIP: 150.36.177.37 serverIP: 28.15.85.198 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"180.41.39.77\",\"externalIp\":\"167.254.163.159\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "180.41.39.77", "serverIP": "167.254.163.159", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 180.41.39.77 serverIP: 167.254.163.159 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T18:16:25.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"3.77.122.113\",\"externalIp\":\"162.94.62.243\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "3.77.122.113", "serverIP": "162.94.62.243", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T18:16:25.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 3.77.122.113 serverIP: 162.94.62.243 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"130.87.239.70\",\"externalIp\":\"125.46.51.167\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "130.87.239.70", "serverIP": "125.46.51.167", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 130.87.239.70 serverIP: 125.46.51.167 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-03T19:59:15.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"212.45.94.16\",\"externalIp\":\"43.0.228.108\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "dataanalytic.biz", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "dataanalytic.biz", "vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "212.45.94.16", "serverIP": "43.0.228.108", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-03T19:59:15.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: dataanalytic.biz messagetype: firewall_action severitycode: 2 fqdn: dataanalytic.biz vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks action: block streamName: OpenDNS Detection clientIP: 212.45.94.16 serverIP: 43.0.228.108 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"94.199.34.22\",\"externalIp\":\"47.180.154.180\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "94.199.34.22", "serverIP": "47.180.154.180", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 94.199.34.22 serverIP: 47.180.154.180 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"173.188.157.226\",\"externalIp\":\"167.8.176.199\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "173.188.157.226", "serverIP": "167.8.176.199", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 173.188.157.226 serverIP: 167.8.176.199 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"40.120.153.45\",\"externalIp\":\"235.233.229.46\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "40.120.153.45", "serverIP": "235.233.229.46", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 40.120.153.45 serverIP: 235.233.229.46 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-18T13:19:31.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"18.116.205.150\",\"externalIp\":\"42.97.27.150\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "www.thebassholes.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "www.thebassholes.com", "vendorcode": "SportsMalwareSports and Recreation", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "18.116.205.150", "serverIP": "42.97.27.150", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-18T13:19:31.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: www.thebassholes.com messagetype: firewall_action severitycode: 2 fqdn: www.thebassholes.com vendorcode: SportsMalwareSports and Recreation action: block streamName: OpenDNS Detection clientIP: 18.116.205.150 serverIP: 42.97.27.150 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1659634462", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "73.82.240.63", "sensitivity": "normal", "application": "Tableau Online - Single Sign-On", "messagetype": "credential_access", "clienthostname": "Tommy's (901-496-9344)", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=249.186.38.157 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"249.186.38.157\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"249.186.38.157\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "249.186.38.157", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1659634462 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 73.82.240.63 sensitivity: normal application: Tableau Online - Single Sign-On messagetype: credential_access clienthostname: Tommy's (901-496-9344) streamName: DUO clientIP: 249.186.38.157 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1659634462", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "73.82.240.63", "sensitivity": "normal", "application": "Tableau Online - Single Sign-On", "messagetype": "credential_access", "clienthostname": "Tommy's (901-496-9344)", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.5.120.99 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"96.5.120.99\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"96.5.120.99\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"bob@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "96.5.120.99", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1659634462 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 73.82.240.63 sensitivity: normal application: Tableau Online - Single Sign-On messagetype: credential_access clienthostname: Tommy's (901-496-9344) streamName: DUO clientIP: 96.5.120.99 userName: bob
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
{ "program": "Chrome", "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1659634462", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "73.82.240.63", "sensitivity": "normal", "application": "Tableau Online - Single Sign-On", "messagetype": "credential_access", "clienthostname": "Tommy's (901-496-9344)", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=119.47.231.218 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"119.47.231.218\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"119.47.231.218\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"fish@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"fish\"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "119.47.231.218", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: program: Chrome senderhost: localhost severitylabel: critical starttimeutc: 1659634462 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 73.82.240.63 sensitivity: normal application: Tableau Online - Single Sign-On messagetype: credential_access clienthostname: Tommy's (901-496-9344) streamName: DUO clientIP: 119.47.231.218 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"230.139.151.185\",\"externalIp\":\"77.140.208.192\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "230.139.151.185", "serverIP": "77.140.208.192", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-23T15:12:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: diromalxx.com messagetype: firewall_action severitycode: 2 fqdn: diromalxx.com vendorcode: AdvertisementsMalwarePhishing action: block streamName: OpenDNS Detection clientIP: 230.139.151.185 serverIP: 77.140.208.192 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"131.78.152.205\",\"externalIp\":\"201.26.73.249\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "131.78.152.205", "serverIP": "201.26.73.249", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-23T15:12:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: diromalxx.com messagetype: firewall_action severitycode: 2 fqdn: diromalxx.com vendorcode: AdvertisementsMalwarePhishing action: block streamName: OpenDNS Detection clientIP: 131.78.152.205 serverIP: 201.26.73.249 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"221.245.66.30\",\"externalIp\":\"41.8.194.125\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "221.245.66.30", "serverIP": "41.8.194.125", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-23T15:12:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: diromalxx.com messagetype: firewall_action severitycode: 2 fqdn: diromalxx.com vendorcode: AdvertisementsMalwarePhishing action: block streamName: OpenDNS Detection clientIP: 221.245.66.30 serverIP: 41.8.194.125 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"60.148.150.99\",\"externalIp\":\"122.88.89.124\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "60.148.150.99", "serverIP": "122.88.89.124", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-23T15:12:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: diromalxx.com messagetype: firewall_action severitycode: 2 fqdn: diromalxx.com vendorcode: AdvertisementsMalwarePhishing action: block streamName: OpenDNS Detection clientIP: 60.148.150.99 serverIP: 122.88.89.124 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"178.78.175.242\",\"externalIp\":\"138.172.248.80\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "178.78.175.242", "serverIP": "138.172.248.80", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2023-03-23T15:12:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: diromalxx.com messagetype: firewall_action severitycode: 2 fqdn: diromalxx.com vendorcode: AdvertisementsMalwarePhishing action: block streamName: OpenDNS Detection clientIP: 178.78.175.242 serverIP: 138.172.248.80 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"242.103.60.58","externalIp":"75.40.130.21","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2023-03-23T15:12:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"242.103.60.58\",\"externalIp\":\"75.40.130.21\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "diromalxx.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "diromalxx.com", "vendorcode": "AdvertisementsMalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "242.103.60.58", "serverIP": "75.40.130.21", "userName": "bob" }
Create a JSON artifact from the message