input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"62.176.66.234","externalIp":"31.223.139.229","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=62.176.66.234 ::: serverIP=31.223.139.229 ::: userName=alice ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 62.176.66.234 serverIP: 31.223.139.229 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T14:44:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"167.36.76.52\",\"externalIp\":\"162.97.222.220\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "167.36.76.52", "serverIP": "162.97.222.220", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"167.36.76.52","externalIp":"162.97.222.220","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=167.36.76.52 ::: serverIP=162.97.222.220 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 167.36.76.52 serverIP: 162.97.222.220 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T14:44:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"135.9.178.40\",\"externalIp\":\"141.100.147.102\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "135.9.178.40", "serverIP": "141.100.147.102", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"135.9.178.40","externalIp":"141.100.147.102","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=135.9.178.40 ::: serverIP=141.100.147.102 ::: userName=nighthawk ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: fbwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 135.9.178.40 serverIP: 141.100.147.102 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T14:44:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"196.228.24.59\",\"externalIp\":\"143.153.53.170\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"fbwallcheck.api-alliance.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "196.228.24.59", "serverIP": "143.153.53.170", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"196.228.24.59","externalIp":"143.153.53.170","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"fbwallcheck.api-alliance.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=196.228.24.59 ::: serverIP=143.153.53.170 ::: userName=janedoe ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=fbwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: fbwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 196.228.24.59 serverIP: 143.153.53.170 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T14:44:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"192.153.122.76\",\"externalIp\":\"30.184.175.230\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "192.153.122.76", "serverIP": "30.184.175.230", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"192.153.122.76","externalIp":"30.184.175.230","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=192.153.122.76 ::: serverIP=30.184.175.230 ::: userName=fish ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 192.153.122.76 serverIP: 30.184.175.230 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T14:44:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"147.172.104.179\",\"externalIp\":\"204.5.0.233\",\"categories\":[\"Business Services\",\"Potentially Harmful\",\"Business and Industry\"],\"tags\":[],\"destination\":\"gwallcheck.api-alliance.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T14:44:16.000Z\"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "gwallcheck.api-alliance.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "gwallcheck.api-alliance.com", "vendorcode": "Business ServicesPotentially HarmfulBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "147.172.104.179", "serverIP": "204.5.0.233", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=gwallcheck.api-alliance.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"147.172.104.179","externalIp":"204.5.0.233","categories":["Business Services","Potentially Harmful","Business and Industry"],"tags":[],"destination":"gwallcheck.api-alliance.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T14:44:16.000Z"} ::: clientIP=147.172.104.179 ::: serverIP=204.5.0.233 ::: userName=bob ::: created_at=2022-11-03T14:44:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesPotentially HarmfulBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T14:44:16.000Z ::: serverHostname=gwallcheck.api-alliance.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T14:44:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: gwallcheck.api-alliance.com messagetype: firewall_action severitycode: 2 fqdn: gwallcheck.api-alliance.com vendorcode: Business ServicesPotentially HarmfulBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 147.172.104.179 serverIP: 204.5.0.233 userName: bob
Explain this syslog message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 8519, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group \"outside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 53459, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "126.111.94.14", "serverIP": "71.186.218.59" }
Create a JSON artifact from the message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:126.111.94.14/53459 dst signal:71.186.218.59/8519 by access-group "outside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 8519 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 53459 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 126.111.94.14 serverIP: 71.186.218.59
Explain this syslog message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 8519, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group \"outside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 53459, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "53.8.80.51", "serverIP": "28.236.173.213" }
Create a JSON artifact from the message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Mar 26 2023 03:39:46 10.52.255.1 : %PIX-4-106023: Deny tcp src outside:53.8.80.51/53459 dst signal:28.236.173.213/8519 by access-group "outside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 8519 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 53459 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 53.8.80.51 serverIP: 28.236.173.213
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"207.225.226.199\",\"externalIp\":\"77.14.44.32\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "207.225.226.199", "serverIP": "77.14.44.32", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"207.225.226.199","externalIp":"77.14.44.32","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=207.225.226.199 ::: serverIP=77.14.44.32 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 207.225.226.199 serverIP: 77.14.44.32 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"252.25.199.230\",\"externalIp\":\"242.228.167.174\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "252.25.199.230", "serverIP": "242.228.167.174", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"252.25.199.230","externalIp":"242.228.167.174","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=252.25.199.230 ::: serverIP=242.228.167.174 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 252.25.199.230 serverIP: 242.228.167.174 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"50.75.32.162\",\"externalIp\":\"142.140.208.29\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "50.75.32.162", "serverIP": "142.140.208.29", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"50.75.32.162","externalIp":"142.140.208.29","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=50.75.32.162 ::: serverIP=142.140.208.29 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 50.75.32.162 serverIP: 142.140.208.29 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"176.190.146.70\",\"externalIp\":\"208.58.250.134\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "176.190.146.70", "serverIP": "208.58.250.134", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"176.190.146.70","externalIp":"208.58.250.134","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=176.190.146.70 ::: serverIP=208.58.250.134 ::: userName=bob ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 176.190.146.70 serverIP: 208.58.250.134 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"19.190.115.21\",\"externalIp\":\"118.57.250.47\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "19.190.115.21", "serverIP": "118.57.250.47", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"19.190.115.21","externalIp":"118.57.250.47","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=19.190.115.21 ::: serverIP=118.57.250.47 ::: userName=alice ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 19.190.115.21 serverIP: 118.57.250.47 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":534627330,\"originType\":\"Network Devices\",\"internalIp\":\"8.143.61.242\",\"externalIp\":\"195.151.52.19\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-05T13:24:41.000Z\"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-05T13:24:41.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "8.143.61.242", "serverIP": "195.151.52.19", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":534627330,"originType":"Network Devices","internalIp":"8.143.61.242","externalIp":"195.151.52.19","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2023-05-05T13:24:41.000Z"} ::: clientIP=8.143.61.242 ::: serverIP=195.151.52.19 ::: userName=charlie ::: created_at=2023-05-05T13:24:41.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-05T13:24:41.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-05T13:24:41.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 8.143.61.242 serverIP: 195.151.52.19 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"247.132.193.67\",\"externalIp\":\"40.122.76.106\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "247.132.193.67", "serverIP": "40.122.76.106", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"247.132.193.67","externalIp":"40.122.76.106","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=247.132.193.67 ::: serverIP=40.122.76.106 ::: userName=johndoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 247.132.193.67 serverIP: 40.122.76.106 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"188.45.192.197\",\"externalIp\":\"151.170.28.134\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "188.45.192.197", "serverIP": "151.170.28.134", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"188.45.192.197","externalIp":"151.170.28.134","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=188.45.192.197 ::: serverIP=151.170.28.134 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 188.45.192.197 serverIP: 151.170.28.134 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"54.55.162.144\",\"externalIp\":\"234.223.123.27\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "54.55.162.144", "serverIP": "234.223.123.27", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"54.55.162.144","externalIp":"234.223.123.27","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=54.55.162.144 ::: serverIP=234.223.123.27 ::: userName=janedoe ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 54.55.162.144 serverIP: 234.223.123.27 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"222.61.8.31\",\"externalIp\":\"47.75.106.221\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "222.61.8.31", "serverIP": "47.75.106.221", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"222.61.8.31","externalIp":"47.75.106.221","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=222.61.8.31 ::: serverIP=47.75.106.221 ::: userName=fish ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 222.61.8.31 serverIP: 47.75.106.221 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"239.132.81.73\",\"externalIp\":\"167.172.171.255\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "239.132.81.73", "serverIP": "167.172.171.255", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"239.132.81.73","externalIp":"167.172.171.255","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=239.132.81.73 ::: serverIP=167.172.171.255 ::: userName=charlie ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 239.132.81.73 serverIP: 167.172.171.255 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-08-10T19:02:23.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={\"originId\":535241639,\"originType\":\"Network Devices\",\"internalIp\":\"46.41.181.66\",\"externalIp\":\"65.190.81.108\",\"categories\":[\"Business Services\",\"Malware\",\"Business and Industry\"],\"tags\":[],\"destination\":\"api.tradplusad.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-08-10T19:02:23.000Z\"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "api.tradplusad.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "api.tradplusad.com", "vendorcode": "Business ServicesMalwareBusiness and Industry", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "46.41.181.66", "serverIP": "65.190.81.108", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=api.tradplusad.com ::: action=BLOCKED ::: message={"originId":535241639,"originType":"Network Devices","internalIp":"46.41.181.66","externalIp":"65.190.81.108","categories":["Business Services","Malware","Business and Industry"],"tags":[],"destination":"api.tradplusad.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-08-10T19:02:23.000Z"} ::: clientIP=46.41.181.66 ::: serverIP=65.190.81.108 ::: userName=nighthawk ::: created_at=2022-08-10T19:02:23.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-08-10T19:02:23.000Z ::: serverHostname=api.tradplusad.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-08-10T19:02:23.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: api.tradplusad.com messagetype: firewall_action severitycode: 2 fqdn: api.tradplusad.com vendorcode: Business ServicesMalwareBusiness and Industry action: block streamName: OpenDNS Detection clientIP: 46.41.181.66 serverIP: 65.190.81.108 userName: nighthawk
Explain this syslog message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 61043, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "113.198.133.127", "serverIP": "63.39.194.127" }
Create a JSON artifact from the message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:113.198.133.127/61043 dst outside:63.39.194.127/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 61043 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 113.198.133.127 serverIP: 63.39.194.127
Explain this syslog message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 61043, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "204.247.30.5", "serverIP": "68.115.112.215" }
Create a JSON artifact from the message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 06 2023 13:46:15 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:204.247.30.5/61043 dst outside:68.115.112.215/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 61043 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 204.247.30.5 serverIP: 68.115.112.215
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"213.158.57.214\",\"externalIp\":\"137.166.156.236\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "213.158.57.214", "serverIP": "137.166.156.236", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"213.158.57.214","externalIp":"137.166.156.236","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=213.158.57.214 ::: serverIP=137.166.156.236 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 213.158.57.214 serverIP: 137.166.156.236 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"19.181.69.130\",\"externalIp\":\"156.52.29.183\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "19.181.69.130", "serverIP": "156.52.29.183", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"19.181.69.130","externalIp":"156.52.29.183","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=19.181.69.130 ::: serverIP=156.52.29.183 ::: userName=johndoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 19.181.69.130 serverIP: 156.52.29.183 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"121.1.189.53\",\"externalIp\":\"56.16.76.133\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "121.1.189.53", "serverIP": "56.16.76.133", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"121.1.189.53","externalIp":"56.16.76.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=121.1.189.53 ::: serverIP=56.16.76.133 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 121.1.189.53 serverIP: 56.16.76.133 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"113.80.145.180\",\"externalIp\":\"30.137.23.204\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "113.80.145.180", "serverIP": "30.137.23.204", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"113.80.145.180","externalIp":"30.137.23.204","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=113.80.145.180 ::: serverIP=30.137.23.204 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 113.80.145.180 serverIP: 30.137.23.204 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"128.237.29.6\",\"externalIp\":\"70.229.192.29\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "128.237.29.6", "serverIP": "70.229.192.29", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"128.237.29.6","externalIp":"70.229.192.29","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=128.237.29.6 ::: serverIP=70.229.192.29 ::: userName=alice ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 128.237.29.6 serverIP: 70.229.192.29 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"4.251.155.247\",\"externalIp\":\"197.117.202.57\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "4.251.155.247", "serverIP": "197.117.202.57", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"4.251.155.247","externalIp":"197.117.202.57","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=4.251.155.247 ::: serverIP=197.117.202.57 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 4.251.155.247 serverIP: 197.117.202.57 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"14.17.80.156\",\"externalIp\":\"228.147.190.0\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "14.17.80.156", "serverIP": "228.147.190.0", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"14.17.80.156","externalIp":"228.147.190.0","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=14.17.80.156 ::: serverIP=228.147.190.0 ::: userName=bob ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 14.17.80.156 serverIP: 228.147.190.0 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"160.128.131.97\",\"externalIp\":\"68.47.66.133\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "160.128.131.97", "serverIP": "68.47.66.133", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"160.128.131.97","externalIp":"68.47.66.133","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=160.128.131.97 ::: serverIP=68.47.66.133 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 160.128.131.97 serverIP: 68.47.66.133 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"30.96.189.109\",\"externalIp\":\"0.56.213.200\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "30.96.189.109", "serverIP": "0.56.213.200", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"30.96.189.109","externalIp":"0.56.213.200","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=30.96.189.109 ::: serverIP=0.56.213.200 ::: userName=fish ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 30.96.189.109 serverIP: 0.56.213.200 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:25:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"1.222.254.191\",\"externalIp\":\"44.124.104.93\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:25:56.000Z\"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "1.222.254.191", "serverIP": "44.124.104.93", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"1.222.254.191","externalIp":"44.124.104.93","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:25:56.000Z"} ::: clientIP=1.222.254.191 ::: serverIP=44.124.104.93 ::: userName=janedoe ::: created_at=2022-12-18T19:25:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:25:56.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:25:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 1.222.254.191 serverIP: 44.124.104.93 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"254.182.122.139\",\"externalIp\":\"23.35.104.158\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "254.182.122.139", "serverIP": "23.35.104.158", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"254.182.122.139","externalIp":"23.35.104.158","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=254.182.122.139 ::: serverIP=23.35.104.158 ::: userName=nighthawk ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 254.182.122.139 serverIP: 23.35.104.158 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-12-18T19:24:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={\"originId\":528251555,\"originType\":\"Roaming Computers\",\"internalIp\":\"67.137.206.16\",\"externalIp\":\"192.45.60.86\",\"categories\":[\"Online Trading\",\"Cryptomining\"],\"tags\":[],\"destination\":\"webminer.moneroocean.stream\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-18T19:24:51.000Z\"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "webminer.moneroocean.stream", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "webminer.moneroocean.stream", "vendorcode": "Online TradingCryptomining", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "67.137.206.16", "serverIP": "192.45.60.86", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=webminer.moneroocean.stream ::: action=BLOCKED ::: message={"originId":528251555,"originType":"Roaming Computers","internalIp":"67.137.206.16","externalIp":"192.45.60.86","categories":["Online Trading","Cryptomining"],"tags":[],"destination":"webminer.moneroocean.stream","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-12-18T19:24:51.000Z"} ::: clientIP=67.137.206.16 ::: serverIP=192.45.60.86 ::: userName=johndoe ::: created_at=2022-12-18T19:24:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Online TradingCryptomining ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-18T19:24:51.000Z ::: serverHostname=webminer.moneroocean.stream ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-12-18T19:24:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: webminer.moneroocean.stream messagetype: firewall_action severitycode: 2 fqdn: webminer.moneroocean.stream vendorcode: Online TradingCryptomining action: block streamName: OpenDNS Detection clientIP: 67.137.206.16 serverIP: 192.45.60.86 userName: johndoe
Explain this syslog message