input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Flags:0",
"trend micro_deep security agent",
"DPI Stream Position:0"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags",
"localstarttime": "Oct 2 08:21:46",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0EF282A10881",
"clientmac": "0E2E5A6C69C3",
"clientport": 36140,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"streamName": "trend micro_deep security agent",
"clientIP": "67.176.193.4",
"serverIP": "155.238.161.28"
} | Create a JSON artifact from the message |
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 2 08:21:46 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36134 cn1Label=Host ID dvc=155.238.161.28 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:F2:82:A1:08:81 smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=67.176.193.4 dst=155.238.161.28 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=36140 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs6=0 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position:0']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 2 08:21:46
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0EF282A10881
clientmac: 0E2E5A6C69C3
clientport: 36140
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
streamName: trend micro_deep security agent
clientIP: 67.176.193.4
serverIP: 155.238.161.28 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"89.109.254.242\",\"externalIp\":\"169.69.123.110\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "89.109.254.242",
"serverIP": "169.69.123.110",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"89.109.254.242","externalIp":"169.69.123.110","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=89.109.254.242 ::: serverIP=169.69.123.110 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 89.109.254.242
serverIP: 169.69.123.110
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"197.60.73.216\",\"externalIp\":\"170.251.228.218\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "197.60.73.216",
"serverIP": "170.251.228.218",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"197.60.73.216","externalIp":"170.251.228.218","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=197.60.73.216 ::: serverIP=170.251.228.218 ::: userName=alice ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 197.60.73.216
serverIP: 170.251.228.218
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"185.79.2.57\",\"externalIp\":\"31.190.53.86\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "185.79.2.57",
"serverIP": "31.190.53.86",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"185.79.2.57","externalIp":"31.190.53.86","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=185.79.2.57 ::: serverIP=31.190.53.86 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 185.79.2.57
serverIP: 31.190.53.86
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"115.13.201.230\",\"externalIp\":\"187.191.206.124\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "115.13.201.230",
"serverIP": "187.191.206.124",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"115.13.201.230","externalIp":"187.191.206.124","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=115.13.201.230 ::: serverIP=187.191.206.124 ::: userName=fish ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 115.13.201.230
serverIP: 187.191.206.124
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"193.187.237.115\",\"externalIp\":\"119.67.211.52\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "193.187.237.115",
"serverIP": "119.67.211.52",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"193.187.237.115","externalIp":"119.67.211.52","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=193.187.237.115 ::: serverIP=119.67.211.52 ::: userName=janedoe ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 193.187.237.115
serverIP: 119.67.211.52
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-07-28T16:39:37.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"99.150.56.77\",\"externalIp\":\"231.1.64.72\",\"categories\":[\"Malware\",\"Not Actionable\"],\"tags\":[],\"destination\":\"captcha4you.top\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-07-28T16:39:37.000Z\"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "captcha4you.top",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "captcha4you.top",
"vendorcode": "MalwareNot Actionable",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "99.150.56.77",
"serverIP": "231.1.64.72",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=captcha4you.top ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"99.150.56.77","externalIp":"231.1.64.72","categories":["Malware","Not Actionable"],"tags":[],"destination":"captcha4you.top","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-07-28T16:39:37.000Z"} ::: clientIP=99.150.56.77 ::: serverIP=231.1.64.72 ::: userName=bob ::: created_at=2022-07-28T16:39:37.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwareNot Actionable ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-07-28T16:39:37.000Z ::: serverHostname=captcha4you.top ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-07-28T16:39:37.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: captcha4you.top
messagetype: firewall_action
severitycode: 2
fqdn: captcha4you.top
vendorcode: MalwareNot Actionable
action: block
streamName: OpenDNS Detection
clientIP: 99.150.56.77
serverIP: 231.1.64.72
userName: bob | Explain this syslog message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | {
"action": "block",
"clientbytes": 26899,
"clientport": 56396,
"facilitylabel": "kernel",
"localhostname": "hq-ie001",
"localstarttime": "Jun 19 20:06:20",
"message": "<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 ",
"messagetype": "firewall_action",
"priority": 4,
"program": "kernel",
"protocol": 6,
"senderhost": "10.1.100.159",
"sensitivity": "normal",
"serverport": 9042,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"ufw",
"firewall_action"
],
"streamName": "ufw",
"clientIP": "145.87.60.80",
"serverIP": "31.241.42.19"
} | Create a JSON artifact from the message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | Product: Uncomplicated Firewall (UFW)
Vendor: linux | Identify this syslog message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=31.241.42.19 DST=145.87.60.80 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message:
action: block
clientbytes: 26899
clientport: 56396
facilitylabel: kernel
localhostname: hq-ie001
localstarttime: Jun 19 20:06:20
messagetype: firewall_action
priority: 4
program: kernel
protocol: 6
senderhost: 10.1.100.159
sensitivity: normal
serverport: 9042
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['rfc3164', 'ufw', 'firewall_action']
streamName: ufw
clientIP: 145.87.60.80
serverIP: 31.241.42.19 | Explain this syslog message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | {
"action": "block",
"clientbytes": 26899,
"clientport": 56396,
"facilitylabel": "kernel",
"localhostname": "hq-ie001",
"localstarttime": "Jun 19 20:06:20",
"message": "<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 ",
"messagetype": "firewall_action",
"priority": 4,
"program": "kernel",
"protocol": 6,
"senderhost": "10.1.100.159",
"sensitivity": "normal",
"serverport": 9042,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"ufw",
"firewall_action"
],
"streamName": "ufw",
"clientIP": "171.52.75.226",
"serverIP": "18.51.107.23"
} | Create a JSON artifact from the message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | Product: Uncomplicated Firewall (UFW)
Vendor: linux | Identify this syslog message |
<4>Jun 19 20:06:20 hq-ie001 kernel: [258259.060031] [UFW BLOCK] IN=ens5 OUT= MAC=02:89:99:e9:b6:8c:02:63:2d:7a:e2:2d:08:00 SRC=18.51.107.23 DST=171.52.75.226 LEN=26899 TOS=0x00 PREC=0x00 TTL=64 ID=6695 DF PROTO=TCP SPT=9042 DPT=56396 WINDOW=4916 RES=0x00 ACK PSH URGP=0 | This is a syslog message from a product called Uncomplicated Firewall (UFW) by linux. The following fields were extracted from the message:
action: block
clientbytes: 26899
clientport: 56396
facilitylabel: kernel
localhostname: hq-ie001
localstarttime: Jun 19 20:06:20
messagetype: firewall_action
priority: 4
program: kernel
protocol: 6
senderhost: 10.1.100.159
sensitivity: normal
serverport: 9042
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['rfc3164', 'ufw', 'firewall_action']
streamName: ufw
clientIP: 171.52.75.226
serverIP: 18.51.107.23 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"165.235.228.166\",\"externalIp\":\"8.123.8.65\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "165.235.228.166",
"serverIP": "8.123.8.65",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"165.235.228.166","externalIp":"8.123.8.65","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=165.235.228.166 ::: serverIP=8.123.8.65 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 165.235.228.166
serverIP: 8.123.8.65
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"62.224.234.252\",\"externalIp\":\"111.211.109.118\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "62.224.234.252",
"serverIP": "111.211.109.118",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"62.224.234.252","externalIp":"111.211.109.118","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=62.224.234.252 ::: serverIP=111.211.109.118 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 62.224.234.252
serverIP: 111.211.109.118
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"11.53.94.159\",\"externalIp\":\"29.150.213.46\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "11.53.94.159",
"serverIP": "29.150.213.46",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"11.53.94.159","externalIp":"29.150.213.46","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=11.53.94.159 ::: serverIP=29.150.213.46 ::: userName=nighthawk ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 11.53.94.159
serverIP: 29.150.213.46
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"37.144.149.160\",\"externalIp\":\"172.243.166.39\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "37.144.149.160",
"serverIP": "172.243.166.39",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"37.144.149.160","externalIp":"172.243.166.39","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=37.144.149.160 ::: serverIP=172.243.166.39 ::: userName=alice ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 37.144.149.160
serverIP: 172.243.166.39
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"78.117.71.91\",\"externalIp\":\"201.168.55.222\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "78.117.71.91",
"serverIP": "201.168.55.222",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"78.117.71.91","externalIp":"201.168.55.222","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=78.117.71.91 ::: serverIP=201.168.55.222 ::: userName=charlie ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 78.117.71.91
serverIP: 201.168.55.222
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"220.209.163.66\",\"externalIp\":\"230.34.92.233\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "220.209.163.66",
"serverIP": "230.34.92.233",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"220.209.163.66","externalIp":"230.34.92.233","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=220.209.163.66 ::: serverIP=230.34.92.233 ::: userName=janedoe ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 220.209.163.66
serverIP: 230.34.92.233
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-20T16:11:50.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"8.215.201.102\",\"externalIp\":\"45.149.206.110\",\"categories\":[\"Ecommerce/Shopping\",\"Malware\",\"Shopping\"],\"tags\":[],\"destination\":\"www.gumballs.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-20T16:11:50.000Z\"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.gumballs.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.gumballs.com",
"vendorcode": "Ecommerce/ShoppingMalwareShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "8.215.201.102",
"serverIP": "45.149.206.110",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"8.215.201.102","externalIp":"45.149.206.110","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=8.215.201.102 ::: serverIP=45.149.206.110 ::: userName=nighthawk ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-20T16:11:50.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.gumballs.com
messagetype: firewall_action
severitycode: 2
fqdn: www.gumballs.com
vendorcode: Ecommerce/ShoppingMalwareShopping
action: block
streamName: OpenDNS Detection
clientIP: 8.215.201.102
serverIP: 45.149.206.110
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-20T16:11:50.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"150.36.177.37\",\"externalIp\":\"28.15.85.198\",\"categories\":[\"Ecommerce/Shopping\",\"Malware\",\"Shopping\"],\"tags\":[],\"destination\":\"www.gumballs.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-20T16:11:50.000Z\"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.gumballs.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.gumballs.com",
"vendorcode": "Ecommerce/ShoppingMalwareShopping",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "150.36.177.37",
"serverIP": "28.15.85.198",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.gumballs.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"150.36.177.37","externalIp":"28.15.85.198","categories":["Ecommerce/Shopping","Malware","Shopping"],"tags":[],"destination":"www.gumballs.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-06-20T16:11:50.000Z"} ::: clientIP=150.36.177.37 ::: serverIP=28.15.85.198 ::: userName=bob ::: created_at=2022-06-20T16:11:50.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Ecommerce/ShoppingMalwareShopping ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-20T16:11:50.000Z ::: serverHostname=www.gumballs.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-20T16:11:50.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.gumballs.com
messagetype: firewall_action
severitycode: 2
fqdn: www.gumballs.com
vendorcode: Ecommerce/ShoppingMalwareShopping
action: block
streamName: OpenDNS Detection
clientIP: 150.36.177.37
serverIP: 28.15.85.198
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"180.41.39.77\",\"externalIp\":\"167.254.163.159\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "180.41.39.77",
"serverIP": "167.254.163.159",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"180.41.39.77","externalIp":"167.254.163.159","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=180.41.39.77 ::: serverIP=167.254.163.159 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 180.41.39.77
serverIP: 167.254.163.159
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T18:16:25.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":535252076,\"originType\":\"Network Devices\",\"internalIp\":\"3.77.122.113\",\"externalIp\":\"162.94.62.243\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T18:16:25.000Z\"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "3.77.122.113",
"serverIP": "162.94.62.243",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":535252076,"originType":"Network Devices","internalIp":"3.77.122.113","externalIp":"162.94.62.243","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T18:16:25.000Z"} ::: clientIP=3.77.122.113 ::: serverIP=162.94.62.243 ::: userName=fish ::: created_at=2022-06-28T18:16:25.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T18:16:25.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T18:16:25.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 3.77.122.113
serverIP: 162.94.62.243
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"130.87.239.70\",\"externalIp\":\"125.46.51.167\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "130.87.239.70",
"serverIP": "125.46.51.167",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"130.87.239.70","externalIp":"125.46.51.167","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=130.87.239.70 ::: serverIP=125.46.51.167 ::: userName=fish ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 130.87.239.70
serverIP: 125.46.51.167
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-03T19:59:15.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={\"originId\":410613270,\"originType\":\"AD Users\",\"internalIp\":\"212.45.94.16\",\"externalIp\":\"43.0.228.108\",\"categories\":[\"Potentially Harmful\",\"Infrastructure and Content Delivery Networks\"],\"tags\":[],\"destination\":\"dataanalytic.biz\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-03T19:59:15.000Z\"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "dataanalytic.biz",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "dataanalytic.biz",
"vendorcode": "Potentially HarmfulInfrastructure and Content Delivery Networks",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "212.45.94.16",
"serverIP": "43.0.228.108",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dataanalytic.biz ::: action=BLOCKED ::: message={"originId":410613270,"originType":"AD Users","internalIp":"212.45.94.16","externalIp":"43.0.228.108","categories":["Potentially Harmful","Infrastructure and Content Delivery Networks"],"tags":[],"destination":"dataanalytic.biz","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-03T19:59:15.000Z"} ::: clientIP=212.45.94.16 ::: serverIP=43.0.228.108 ::: userName=nighthawk ::: created_at=2022-06-03T19:59:15.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Potentially HarmfulInfrastructure and Content Delivery Networks ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-03T19:59:15.000Z ::: serverHostname=dataanalytic.biz ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-03T19:59:15.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: dataanalytic.biz
messagetype: firewall_action
severitycode: 2
fqdn: dataanalytic.biz
vendorcode: Potentially HarmfulInfrastructure and Content Delivery Networks
action: block
streamName: OpenDNS Detection
clientIP: 212.45.94.16
serverIP: 43.0.228.108
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"94.199.34.22\",\"externalIp\":\"47.180.154.180\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "94.199.34.22",
"serverIP": "47.180.154.180",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"94.199.34.22","externalIp":"47.180.154.180","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=94.199.34.22 ::: serverIP=47.180.154.180 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 94.199.34.22
serverIP: 47.180.154.180
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"173.188.157.226\",\"externalIp\":\"167.8.176.199\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "173.188.157.226",
"serverIP": "167.8.176.199",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"173.188.157.226","externalIp":"167.8.176.199","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=173.188.157.226 ::: serverIP=167.8.176.199 ::: userName=janedoe ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 173.188.157.226
serverIP: 167.8.176.199
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"40.120.153.45\",\"externalIp\":\"235.233.229.46\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "40.120.153.45",
"serverIP": "235.233.229.46",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"40.120.153.45","externalIp":"235.233.229.46","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=40.120.153.45 ::: serverIP=235.233.229.46 ::: userName=charlie ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 40.120.153.45
serverIP: 235.233.229.46
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-18T13:19:31.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={\"originId\":517728329,\"originType\":\"AD Users\",\"internalIp\":\"18.116.205.150\",\"externalIp\":\"42.97.27.150\",\"categories\":[\"Sports\",\"Malware\",\"Sports and Recreation\"],\"tags\":[],\"destination\":\"www.thebassholes.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-18T13:19:31.000Z\"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "www.thebassholes.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "www.thebassholes.com",
"vendorcode": "SportsMalwareSports and Recreation",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "18.116.205.150",
"serverIP": "42.97.27.150",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=www.thebassholes.com ::: action=BLOCKED ::: message={"originId":517728329,"originType":"AD Users","internalIp":"18.116.205.150","externalIp":"42.97.27.150","categories":["Sports","Malware","Sports and Recreation"],"tags":[],"destination":"www.thebassholes.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-18T13:19:31.000Z"} ::: clientIP=18.116.205.150 ::: serverIP=42.97.27.150 ::: userName=nighthawk ::: created_at=2022-06-18T13:19:31.000Z ::: streamName=OpenDNS Detection ::: vendorCode=SportsMalwareSports and Recreation ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-18T13:19:31.000Z ::: serverHostname=www.thebassholes.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-18T13:19:31.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: www.thebassholes.com
messagetype: firewall_action
severitycode: 2
fqdn: www.thebassholes.com
vendorcode: SportsMalwareSports and Recreation
action: block
streamName: OpenDNS Detection
clientIP: 18.116.205.150
serverIP: 42.97.27.150
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1659634462",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "73.82.240.63",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"clienthostname": "Tommy's (901-496-9344)",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=249.186.38.157 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"249.186.38.157\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"249.186.38.157\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"bob@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "249.186.38.157",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=249.186.38.157 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"249.186.38.157","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"249.186.38.157","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=249.186.38.157 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1659634462
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 73.82.240.63
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
clienthostname: Tommy's (901-496-9344)
streamName: DUO
clientIP: 249.186.38.157
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1659634462",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "73.82.240.63",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"clienthostname": "Tommy's (901-496-9344)",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=96.5.120.99 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"96.5.120.99\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"96.5.120.99\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"bob@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"bob\"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "96.5.120.99",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=96.5.120.99 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"96.5.120.99","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"96.5.120.99","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"bob@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"bob"}} ::: program=Chrome ::: clientIP=96.5.120.99 ::: userName=bob ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1659634462
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 73.82.240.63
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
clienthostname: Tommy's (901-496-9344)
streamName: DUO
clientIP: 96.5.120.99
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1659634462",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "73.82.240.63",
"sensitivity": "normal",
"application": "Tableau Online - Single Sign-On",
"messagetype": "credential_access",
"clienthostname": "Tommy's (901-496-9344)",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=119.47.231.218 ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"104.0.5112.80\",\"epkey\":\"EPQLRT75BZ0TWF4E0B31\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"119.47.231.218\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"alias\":\"\",\"application\":{\"key\":\"DI0V8DYT5W8D63DOH7FO\",\"name\":\"Tableau Online - Single Sign-On\"},\"auth_device\":{\"ip\":\"119.47.231.218\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"Tommy's (901-496-9344)\"},\"email\":\"fish@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-08-04T17:34:22.118417+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1659634462,\"txid\":\"a464d743-4d94-49ab-b9d1-d334e650317a\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU5X369RUOK3XA7G7GHS\",\"name\":\"fish\"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "119.47.231.218",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=119.47.231.218 ::: message={"access_device":{"browser":"Chrome","browser_version":"104.0.5112.80","epkey":"EPQLRT75BZ0TWF4E0B31","flash_version":"uninstalled","hostname":null,"ip":"119.47.231.218","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"os":"Windows","os_version":"10"},"alias":"","application":{"key":"DI0V8DYT5W8D63DOH7FO","name":"Tableau Online - Single Sign-On"},"auth_device":{"ip":"119.47.231.218","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"Tommy's (901-496-9344)"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-08-04T17:34:22.118417+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1659634462,"txid":"a464d743-4d94-49ab-b9d1-d334e650317a","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU5X369RUOK3XA7G7GHS","name":"fish"}} ::: program=Chrome ::: clientIP=119.47.231.218 ::: userName=fish ::: created_at=1659634462 ::: streamName=DUO ::: application=Tableau Online - Single Sign-On ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1659634462 ::: clientHostname=Tommy's (901-496-9344) ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1659634462
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 73.82.240.63
sensitivity: normal
application: Tableau Online - Single Sign-On
messagetype: credential_access
clienthostname: Tommy's (901-496-9344)
streamName: DUO
clientIP: 119.47.231.218
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"230.139.151.185\",\"externalIp\":\"77.140.208.192\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "230.139.151.185",
"serverIP": "77.140.208.192",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"230.139.151.185","externalIp":"77.140.208.192","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=230.139.151.185 ::: serverIP=77.140.208.192 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 230.139.151.185
serverIP: 77.140.208.192
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"131.78.152.205\",\"externalIp\":\"201.26.73.249\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "131.78.152.205",
"serverIP": "201.26.73.249",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"131.78.152.205","externalIp":"201.26.73.249","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=131.78.152.205 ::: serverIP=201.26.73.249 ::: userName=fish ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 131.78.152.205
serverIP: 201.26.73.249
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"221.245.66.30\",\"externalIp\":\"41.8.194.125\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "221.245.66.30",
"serverIP": "41.8.194.125",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"221.245.66.30","externalIp":"41.8.194.125","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=221.245.66.30 ::: serverIP=41.8.194.125 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 221.245.66.30
serverIP: 41.8.194.125
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"60.148.150.99\",\"externalIp\":\"122.88.89.124\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "60.148.150.99",
"serverIP": "122.88.89.124",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"60.148.150.99","externalIp":"122.88.89.124","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=60.148.150.99 ::: serverIP=122.88.89.124 ::: userName=johndoe ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 60.148.150.99
serverIP: 122.88.89.124
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"178.78.175.242\",\"externalIp\":\"138.172.248.80\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "178.78.175.242",
"serverIP": "138.172.248.80",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"178.78.175.242","externalIp":"138.172.248.80","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=178.78.175.242 ::: serverIP=138.172.248.80 ::: userName=nighthawk ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2023-03-23T15:12:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: diromalxx.com
messagetype: firewall_action
severitycode: 2
fqdn: diromalxx.com
vendorcode: AdvertisementsMalwarePhishing
action: block
streamName: OpenDNS Detection
clientIP: 178.78.175.242
serverIP: 138.172.248.80
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={"originId":535389021,"originType":"Network Devices","internalIp":"242.103.60.58","externalIp":"75.40.130.21","categories":["Advertisements","Malware","Phishing"],"tags":[],"destination":"diromalxx.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-03-23T15:12:23.000Z"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2023-03-23T15:12:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=diromalxx.com ::: action=BLOCKED ::: message={\"originId\":535389021,\"originType\":\"Network Devices\",\"internalIp\":\"242.103.60.58\",\"externalIp\":\"75.40.130.21\",\"categories\":[\"Advertisements\",\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"diromalxx.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-03-23T15:12:23.000Z\"} ::: clientIP=242.103.60.58 ::: serverIP=75.40.130.21 ::: userName=bob ::: created_at=2023-03-23T15:12:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsMalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-23T15:12:23.000Z ::: serverHostname=diromalxx.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "diromalxx.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "diromalxx.com",
"vendorcode": "AdvertisementsMalwarePhishing",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "242.103.60.58",
"serverIP": "75.40.130.21",
"userName": "bob"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.