input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: jcodesigns.ucoz.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: jcodesigns.ucoz.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-03-27T13:37:13.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting
streamName: OpenDNS Detection
clientIP: 196.215.233.27
serverIP: 8.16.2.45
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"173.221.239.168\",\"externalIp\":\"137.193.118.48\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "173.221.239.168",
"serverIP": "137.193.118.48",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 173.221.239.168
serverIP: 137.193.118.48
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"107.181.144.123\",\"externalIp\":\"153.194.66.51\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "107.181.144.123",
"serverIP": "153.194.66.51",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 107.181.144.123
serverIP: 153.194.66.51
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"3.31.90.237\",\"externalIp\":\"147.83.24.93\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "3.31.90.237",
"serverIP": "147.83.24.93",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 3.31.90.237
serverIP: 147.83.24.93
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"105.232.167.116\",\"externalIp\":\"118.106.7.1\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "105.232.167.116",
"serverIP": "118.106.7.1",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 105.232.167.116
serverIP: 118.106.7.1
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"94.103.39.116\",\"externalIp\":\"45.60.137.142\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "94.103.39.116",
"serverIP": "45.60.137.142",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 94.103.39.116
serverIP: 45.60.137.142
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "8b9714d2f2.413dfe9f11.com",
"message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"167.158.54.199\",\"externalIp\":\"41.209.190.70\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "8b9714d2f2.413dfe9f11.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-12-03T01:47:11.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "167.158.54.199",
"serverIP": "41.209.190.70",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: 8b9714d2f2.413dfe9f11.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: 8b9714d2f2.413dfe9f11.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-12-03T01:47:11.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 167.158.54.199
serverIP: 41.209.190.70
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"43.7.65.240\",\"externalIp\":\"37.228.119.240\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "43.7.65.240",
"serverIP": "37.228.119.240",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 43.7.65.240
serverIP: 37.228.119.240
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"1.136.132.15\",\"externalIp\":\"32.128.239.30\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "1.136.132.15",
"serverIP": "32.128.239.30",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 1.136.132.15
serverIP: 32.128.239.30
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"125.188.113.112\",\"externalIp\":\"99.64.83.76\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "125.188.113.112",
"serverIP": "99.64.83.76",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 125.188.113.112
serverIP: 99.64.83.76
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"201.120.196.10\",\"externalIp\":\"115.75.88.182\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "201.120.196.10",
"serverIP": "115.75.88.182",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 201.120.196.10
serverIP: 115.75.88.182
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"19.246.48.108\",\"externalIp\":\"80.116.225.239\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "19.246.48.108",
"serverIP": "80.116.225.239",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 19.246.48.108
serverIP: 80.116.225.239
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "vast.doubleverify.com",
"message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"92.105.188.91\",\"externalIp\":\"109.34.247.124\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "vast.doubleverify.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-10T16:39:43.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Business ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "92.105.188.91",
"serverIP": "109.34.247.124",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: vast.doubleverify.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: vast.doubleverify.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-10T16:39:43.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Business ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 92.105.188.91
serverIP: 109.34.247.124
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"225.89.103.54\",\"externalIp\":\"225.89.103.54\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "225.89.103.54",
"serverIP": "193.29.47.118",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 225.89.103.54
serverIP: 193.29.47.118
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"248.37.243.55\",\"externalIp\":\"248.37.243.55\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "248.37.243.55",
"serverIP": "182.15.155.97",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 248.37.243.55
serverIP: 182.15.155.97
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"220.160.94.78\",\"externalIp\":\"220.160.94.78\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "220.160.94.78",
"serverIP": "8.234.167.168",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 220.160.94.78
serverIP: 8.234.167.168
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"216.226.34.80\",\"externalIp\":\"216.226.34.80\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "216.226.34.80",
"serverIP": "97.17.45.214",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 216.226.34.80
serverIP: 97.17.45.214
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"59.107.13.129\",\"externalIp\":\"59.107.13.129\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "59.107.13.129",
"serverIP": "189.55.213.188",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 59.107.13.129
serverIP: 189.55.213.188
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "xobr219pa.com",
"message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"247.138.123.165\",\"externalIp\":\"247.138.123.165\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "xobr219pa.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-05-10T19:58:06.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Malware",
"streamName": "OpenDNS Detection",
"clientIP": "247.138.123.165",
"serverIP": "205.19.253.126",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: xobr219pa.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: xobr219pa.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-05-10T19:58:06.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Malware
streamName: OpenDNS Detection
clientIP: 247.138.123.165
serverIP: 205.19.253.126
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"188.101.60.50\",\"externalIp\":\"29.153.4.254\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "188.101.60.50",
"serverIP": "29.153.4.254",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 188.101.60.50
serverIP: 29.153.4.254
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"136.139.92.129\",\"externalIp\":\"112.92.86.166\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "136.139.92.129",
"serverIP": "112.92.86.166",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 136.139.92.129
serverIP: 112.92.86.166
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"26.183.202.182\",\"externalIp\":\"58.105.252.46\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "26.183.202.182",
"serverIP": "58.105.252.46",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 26.183.202.182
serverIP: 58.105.252.46
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"194.104.102.234\",\"externalIp\":\"113.120.49.75\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "194.104.102.234",
"serverIP": "113.120.49.75",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 194.104.102.234
serverIP: 113.120.49.75
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"141.219.19.167\",\"externalIp\":\"144.135.53.106\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "141.219.19.167",
"serverIP": "144.135.53.106",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 141.219.19.167
serverIP: 144.135.53.106
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | {
"action": "block",
"fqdn": "dvrtr.innovid.com",
"message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"227.99.30.149\",\"externalIp\":\"5.128.73.189\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch",
"messagetype": "firewall_action",
"productids": [
38
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"serverhostname": "dvrtr.innovid.com",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2022-10-24T18:15:38.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry",
"streamName": "OpenDNS Detection",
"clientIP": "227.99.30.149",
"serverIP": "5.128.73.189",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
action: block
fqdn: dvrtr.innovid.com
messagetype: firewall_action
productids: [38]
senderhost: kafka.precinct
sensitivity: normal
serverhostname: dvrtr.innovid.com
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2022-10-24T18:15:38.000Z
tags: ['OpenDNS Detection', 'firewall_action']
vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry
streamName: OpenDNS Detection
clientIP: 227.99.30.149
serverIP: 5.128.73.189
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:36:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"209.96.213.165\",\"externalIp\":\"27.123.141.216\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "209.96.213.165",
"serverIP": "27.123.141.216",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:36:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 209.96.213.165
serverIP: 27.123.141.216
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:36:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"157.21.17.82\",\"externalIp\":\"180.175.245.247\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "157.21.17.82",
"serverIP": "180.175.245.247",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:36:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 157.21.17.82
serverIP: 180.175.245.247
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T20:03:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"41.149.6.223\",\"externalIp\":\"182.245.193.199\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "41.149.6.223",
"serverIP": "182.245.193.199",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T20:03:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 41.149.6.223
serverIP: 182.245.193.199
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T20:03:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"31.193.156.155\",\"externalIp\":\"151.234.141.147\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "31.193.156.155",
"serverIP": "151.234.141.147",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T20:03:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 31.193.156.155
serverIP: 151.234.141.147
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:36:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"65.227.72.74\",\"externalIp\":\"91.13.219.214\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "65.227.72.74",
"serverIP": "91.13.219.214",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:36:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 65.227.72.74
serverIP: 91.13.219.214
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:36:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"113.30.226.165\",\"externalIp\":\"24.84.63.141\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "113.30.226.165",
"serverIP": "24.84.63.141",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-28T19:36:52.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 113.30.226.165
serverIP: 24.84.63.141
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T20:03:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"114.232.42.176\",\"externalIp\":\"225.63.84.153\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "114.232.42.176",
"serverIP": "225.63.84.153",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T20:03:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 114.232.42.176
serverIP: 225.63.84.153
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-05-23T20:03:16.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"130.118.194.85\",\"externalIp\":\"178.46.141.197\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "130.118.194.85",
"serverIP": "178.46.141.197",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-05-23T20:03:16.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: search.hdownloadmyinboxhelper.com
messagetype: firewall_action
severitycode: 2
fqdn: search.hdownloadmyinboxhelper.com
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 130.118.194.85
serverIP: 178.46.141.197
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"153.45.150.140","externalIp":"36.214.251.166","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | {
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-28T19:36:52.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"153.45.150.140\",\"externalIp\":\"36.214.251.166\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "search.hdownloadmyinboxhelper.com",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "search.hdownloadmyinboxhelper.com",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "153.45.150.140",
"serverIP": "36.214.251.166",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"153.45.150.140","externalIp":"36.214.251.166","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch | Product: Umbrella
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.