input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"62.176.66.234","externalIp":"31.223.139.229","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=62.176.66.234 ::: serverIP=31.223.139.229 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 62.176.66.234
serverIP: 31.223.139.229
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"167.36.76.52\",\"externalIp\":\"162.97.222.220\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "167.36.76.52",
"serverIP": "162.97.222.220",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 167.36.76.52
serverIP: 162.97.222.220
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"135.9.178.40\",\"externalIp\":\"141.100.147.102\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "135.9.178.40",
"serverIP": "141.100.147.102",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 135.9.178.40
serverIP: 141.100.147.102
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"196.228.24.59\",\"externalIp\":\"143.153.53.170\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "fbwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "fbwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "196.228.24.59",
"serverIP": "143.153.53.170",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: fbwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: fbwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 196.228.24.59
serverIP: 143.153.53.170
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"192.153.122.76\",\"externalIp\":\"30.184.175.230\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "192.153.122.76",
"serverIP": "30.184.175.230",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 192.153.122.76
serverIP: 30.184.175.230
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-11-03T14:44:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"147.172.104.179\",\"externalIp\":\"204.5.0.233\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "gwallcheck.api-alliance.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "gwallcheck.api-alliance.com",
"vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "147.172.104.179",
"serverIP": "204.5.0.233",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-11-03T14:44:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: gwallcheck.api-alliance.com
messagetype: firewall_action
severitycode: 2
fqdn: gwallcheck.api-alliance.com
vendorcode: Business ServicesPotentially HarmfulBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 147.172.104.179
serverIP: 204.5.0.233
userName: bob | Explain this syslog message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 8519,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 53459,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "126.111.94.14",
"serverIP": "71.186.218.59"
} | Create a JSON artifact from the message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 8519
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 53459
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 126.111.94.14
serverIP: 71.186.218.59 | Explain this syslog message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 8519,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 53459,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "53.8.80.51",
"serverIP": "28.236.173.213"
} | Create a JSON artifact from the message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 8519
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 53459
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 53.8.80.51
serverIP: 28.236.173.213 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"207.225.226.199\",\"externalIp\":\"77.14.44.32\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "207.225.226.199",
"serverIP": "77.14.44.32",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 207.225.226.199
serverIP: 77.14.44.32
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"252.25.199.230\",\"externalIp\":\"242.228.167.174\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "252.25.199.230",
"serverIP": "242.228.167.174",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 252.25.199.230
serverIP: 242.228.167.174
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"50.75.32.162\",\"externalIp\":\"142.140.208.29\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "50.75.32.162",
"serverIP": "142.140.208.29",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 50.75.32.162
serverIP: 142.140.208.29
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"176.190.146.70\",\"externalIp\":\"208.58.250.134\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "176.190.146.70",
"serverIP": "208.58.250.134",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 176.190.146.70
serverIP: 208.58.250.134
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"19.190.115.21\",\"externalIp\":\"118.57.250.47\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "19.190.115.21",
"serverIP": "118.57.250.47",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 19.190.115.21
serverIP: 118.57.250.47
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"8.143.61.242\",\"externalIp\":\"195.151.52.19\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-05T13:24:41.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "8.143.61.242",
"serverIP": "195.151.52.19",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-05T13:24:41.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 8.143.61.242
serverIP: 195.151.52.19
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"247.132.193.67\",\"externalIp\":\"40.122.76.106\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "247.132.193.67",
"serverIP": "40.122.76.106",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 247.132.193.67
serverIP: 40.122.76.106
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"188.45.192.197\",\"externalIp\":\"151.170.28.134\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "188.45.192.197",
"serverIP": "151.170.28.134",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 188.45.192.197
serverIP: 151.170.28.134
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"54.55.162.144\",\"externalIp\":\"234.223.123.27\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "54.55.162.144",
"serverIP": "234.223.123.27",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 54.55.162.144
serverIP: 234.223.123.27
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"222.61.8.31\",\"externalIp\":\"47.75.106.221\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "222.61.8.31",
"serverIP": "47.75.106.221",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 222.61.8.31
serverIP: 47.75.106.221
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"239.132.81.73\",\"externalIp\":\"167.172.171.255\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "239.132.81.73",
"serverIP": "167.172.171.255",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 239.132.81.73
serverIP: 167.172.171.255
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-08-10T19:02:23.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"46.41.181.66\",\"externalIp\":\"65.190.81.108\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "api.tradplusad.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "api.tradplusad.com",
"vendorcode": "Business ServicesMalwareBusiness and Industry",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "46.41.181.66",
"serverIP": "65.190.81.108",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-08-10T19:02:23.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: api.tradplusad.com
messagetype: firewall_action
severitycode: 2
fqdn: api.tradplusad.com
vendorcode: Business ServicesMalwareBusiness and Industry
action: block
streamName: OpenDNS Detection
clientIP: 46.41.181.66
serverIP: 65.190.81.108
userName: nighthawk | Explain this syslog message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 61043,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "113.198.133.127",
"serverIP": "63.39.194.127"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 61043
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 113.198.133.127
serverIP: 63.39.194.127 | Explain this syslog message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 61043,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "204.247.30.5",
"serverIP": "68.115.112.215"
} | Create a JSON artifact from the message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 61043
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 204.247.30.5
serverIP: 68.115.112.215 | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"213.158.57.214\",\"externalIp\":\"137.166.156.236\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "213.158.57.214",
"serverIP": "137.166.156.236",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 213.158.57.214
serverIP: 137.166.156.236
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"19.181.69.130\",\"externalIp\":\"156.52.29.183\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "19.181.69.130",
"serverIP": "156.52.29.183",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 19.181.69.130
serverIP: 156.52.29.183
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"121.1.189.53\",\"externalIp\":\"56.16.76.133\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "121.1.189.53",
"serverIP": "56.16.76.133",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 121.1.189.53
serverIP: 56.16.76.133
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"113.80.145.180\",\"externalIp\":\"30.137.23.204\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "113.80.145.180",
"serverIP": "30.137.23.204",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 113.80.145.180
serverIP: 30.137.23.204
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"128.237.29.6\",\"externalIp\":\"70.229.192.29\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "128.237.29.6",
"serverIP": "70.229.192.29",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 128.237.29.6
serverIP: 70.229.192.29
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"4.251.155.247\",\"externalIp\":\"197.117.202.57\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "4.251.155.247",
"serverIP": "197.117.202.57",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 4.251.155.247
serverIP: 197.117.202.57
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"14.17.80.156\",\"externalIp\":\"228.147.190.0\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "14.17.80.156",
"serverIP": "228.147.190.0",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 14.17.80.156
serverIP: 228.147.190.0
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"160.128.131.97\",\"externalIp\":\"68.47.66.133\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "160.128.131.97",
"serverIP": "68.47.66.133",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 160.128.131.97
serverIP: 68.47.66.133
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"30.96.189.109\",\"externalIp\":\"0.56.213.200\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "30.96.189.109",
"serverIP": "0.56.213.200",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 30.96.189.109
serverIP: 0.56.213.200
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:25:56.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"1.222.254.191\",\"externalIp\":\"44.124.104.93\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "1.222.254.191",
"serverIP": "44.124.104.93",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:25:56.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 1.222.254.191
serverIP: 44.124.104.93
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"254.182.122.139\",\"externalIp\":\"23.35.104.158\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "254.182.122.139",
"serverIP": "23.35.104.158",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 254.182.122.139
serverIP: 23.35.104.158
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-12-18T19:24:51.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"67.137.206.16\",\"externalIp\":\"192.45.60.86\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "webminer.moneroocean.stream",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "webminer.moneroocean.stream",
"vendorcode": "Online TradingCryptomining",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "67.137.206.16",
"serverIP": "192.45.60.86",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-12-18T19:24:51.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: webminer.moneroocean.stream
messagetype: firewall_action
severitycode: 2
fqdn: webminer.moneroocean.stream
vendorcode: Online TradingCryptomining
action: block
streamName: OpenDNS Detection
clientIP: 67.137.206.16
serverIP: 192.45.60.86
userName: johndoe | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.