input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=jcodesigns.ucoz.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"196.215.233.27","externalIp":"8.16.2.45","categories":["File Storage","Software/Technology","Malware","Web Hosting"],"tags":[],"destination":"jcodesigns.ucoz.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-03-27T13:37:13.000Z"} ::: clientIP=196.215.233.27 ::: serverIP=8.16.2.45 ::: userName=johndoe ::: created_at=2023-03-27T13:37:13.000Z ::: streamName=OpenDNS Detection ::: vendorCode=File StorageSoftware/TechnologyMalwareWeb Hosting ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-03-27T13:37:13.000Z ::: serverHostname=jcodesigns.ucoz.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: jcodesigns.ucoz.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: jcodesigns.ucoz.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-03-27T13:37:13.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: File StorageSoftware/TechnologyMalwareWeb Hosting streamName: OpenDNS Detection clientIP: 196.215.233.27 serverIP: 8.16.2.45 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"173.221.239.168\",\"externalIp\":\"137.193.118.48\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "173.221.239.168", "serverIP": "137.193.118.48", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"173.221.239.168","externalIp":"137.193.118.48","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=173.221.239.168 ::: serverIP=137.193.118.48 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 173.221.239.168 serverIP: 137.193.118.48 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"107.181.144.123\",\"externalIp\":\"153.194.66.51\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "107.181.144.123", "serverIP": "153.194.66.51", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"107.181.144.123","externalIp":"153.194.66.51","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=107.181.144.123 ::: serverIP=153.194.66.51 ::: userName=bob ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 107.181.144.123 serverIP: 153.194.66.51 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"3.31.90.237\",\"externalIp\":\"147.83.24.93\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "3.31.90.237", "serverIP": "147.83.24.93", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"3.31.90.237","externalIp":"147.83.24.93","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=3.31.90.237 ::: serverIP=147.83.24.93 ::: userName=janedoe ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 3.31.90.237 serverIP: 147.83.24.93 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"105.232.167.116\",\"externalIp\":\"118.106.7.1\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "105.232.167.116", "serverIP": "118.106.7.1", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"105.232.167.116","externalIp":"118.106.7.1","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=105.232.167.116 ::: serverIP=118.106.7.1 ::: userName=alice ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 105.232.167.116 serverIP: 118.106.7.1 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"94.103.39.116\",\"externalIp\":\"45.60.137.142\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "94.103.39.116", "serverIP": "45.60.137.142", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"94.103.39.116","externalIp":"45.60.137.142","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=94.103.39.116 ::: serverIP=45.60.137.142 ::: userName=nighthawk ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 94.103.39.116 serverIP: 45.60.137.142 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "8b9714d2f2.413dfe9f11.com", "message": "WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"167.158.54.199\",\"externalIp\":\"41.209.190.70\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"8b9714d2f2.413dfe9f11.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-12-03T01:47:11.000Z\"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "8b9714d2f2.413dfe9f11.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-12-03T01:47:11.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "167.158.54.199", "serverIP": "41.209.190.70", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=8b9714d2f2.413dfe9f11.com ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"167.158.54.199","externalIp":"41.209.190.70","categories":["Malware"],"tags":[],"destination":"8b9714d2f2.413dfe9f11.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-12-03T01:47:11.000Z"} ::: clientIP=167.158.54.199 ::: serverIP=41.209.190.70 ::: userName=charlie ::: created_at=2022-12-03T01:47:11.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-12-03T01:47:11.000Z ::: serverHostname=8b9714d2f2.413dfe9f11.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: 8b9714d2f2.413dfe9f11.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: 8b9714d2f2.413dfe9f11.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-12-03T01:47:11.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 167.158.54.199 serverIP: 41.209.190.70 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"43.7.65.240\",\"externalIp\":\"37.228.119.240\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "43.7.65.240", "serverIP": "37.228.119.240", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"43.7.65.240","externalIp":"37.228.119.240","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=43.7.65.240 ::: serverIP=37.228.119.240 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 43.7.65.240 serverIP: 37.228.119.240 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"1.136.132.15\",\"externalIp\":\"32.128.239.30\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "1.136.132.15", "serverIP": "32.128.239.30", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"1.136.132.15","externalIp":"32.128.239.30","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=1.136.132.15 ::: serverIP=32.128.239.30 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 1.136.132.15 serverIP: 32.128.239.30 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"125.188.113.112\",\"externalIp\":\"99.64.83.76\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "125.188.113.112", "serverIP": "99.64.83.76", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"125.188.113.112","externalIp":"99.64.83.76","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=125.188.113.112 ::: serverIP=99.64.83.76 ::: userName=nighthawk ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 125.188.113.112 serverIP: 99.64.83.76 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"201.120.196.10\",\"externalIp\":\"115.75.88.182\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "201.120.196.10", "serverIP": "115.75.88.182", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"201.120.196.10","externalIp":"115.75.88.182","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=201.120.196.10 ::: serverIP=115.75.88.182 ::: userName=bob ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 201.120.196.10 serverIP: 115.75.88.182 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"19.246.48.108\",\"externalIp\":\"80.116.225.239\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "19.246.48.108", "serverIP": "80.116.225.239", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"19.246.48.108","externalIp":"80.116.225.239","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=19.246.48.108 ::: serverIP=80.116.225.239 ::: userName=charlie ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 19.246.48.108 serverIP: 80.116.225.239 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "vast.doubleverify.com", "message": "WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"92.105.188.91\",\"externalIp\":\"109.34.247.124\",\"categories\":[\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"vast.doubleverify.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-10T16:39:43.000Z\"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "vast.doubleverify.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-10T16:39:43.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Business ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "92.105.188.91", "serverIP": "109.34.247.124", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=vast.doubleverify.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"92.105.188.91","externalIp":"109.34.247.124","categories":["Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"vast.doubleverify.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-10T16:39:43.000Z"} ::: clientIP=92.105.188.91 ::: serverIP=109.34.247.124 ::: userName=johndoe ::: created_at=2022-10-10T16:39:43.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Business ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-10T16:39:43.000Z ::: serverHostname=vast.doubleverify.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: vast.doubleverify.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: vast.doubleverify.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-10T16:39:43.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Business ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 92.105.188.91 serverIP: 109.34.247.124 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"225.89.103.54\",\"externalIp\":\"225.89.103.54\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "225.89.103.54", "serverIP": "193.29.47.118", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"225.89.103.54","externalIp":"225.89.103.54","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=225.89.103.54 ::: serverIP=225.89.103.54 ::: userName=alice ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 225.89.103.54 serverIP: 193.29.47.118 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"248.37.243.55\",\"externalIp\":\"248.37.243.55\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "248.37.243.55", "serverIP": "182.15.155.97", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"248.37.243.55","externalIp":"248.37.243.55","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=248.37.243.55 ::: serverIP=248.37.243.55 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 248.37.243.55 serverIP: 182.15.155.97 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"220.160.94.78\",\"externalIp\":\"220.160.94.78\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "220.160.94.78", "serverIP": "8.234.167.168", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"220.160.94.78","externalIp":"220.160.94.78","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=220.160.94.78 ::: serverIP=220.160.94.78 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 220.160.94.78 serverIP: 8.234.167.168 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"216.226.34.80\",\"externalIp\":\"216.226.34.80\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "216.226.34.80", "serverIP": "97.17.45.214", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"216.226.34.80","externalIp":"216.226.34.80","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=216.226.34.80 ::: serverIP=216.226.34.80 ::: userName=nighthawk ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 216.226.34.80 serverIP: 97.17.45.214 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"59.107.13.129\",\"externalIp\":\"59.107.13.129\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "59.107.13.129", "serverIP": "189.55.213.188", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"59.107.13.129","externalIp":"59.107.13.129","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=59.107.13.129 ::: serverIP=59.107.13.129 ::: userName=janedoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 59.107.13.129 serverIP: 189.55.213.188 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "xobr219pa.com", "message": "WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={\"originId\":596750534,\"originType\":\"Roaming Computers\",\"internalIp\":\"247.138.123.165\",\"externalIp\":\"247.138.123.165\",\"categories\":[\"Malware\"],\"tags\":[],\"destination\":\"xobr219pa.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2023-05-10T19:58:06.000Z\"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "xobr219pa.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-05-10T19:58:06.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Malware", "streamName": "OpenDNS Detection", "clientIP": "247.138.123.165", "serverIP": "205.19.253.126", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=xobr219pa.com ::: action=BLOCKED ::: message={"originId":596750534,"originType":"Roaming Computers","internalIp":"247.138.123.165","externalIp":"247.138.123.165","categories":["Malware"],"tags":[],"destination":"xobr219pa.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2023-05-10T19:58:06.000Z"} ::: clientIP=247.138.123.165 ::: serverIP=247.138.123.165 ::: userName=johndoe ::: created_at=2023-05-10T19:58:06.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Malware ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2023-05-10T19:58:06.000Z ::: serverHostname=xobr219pa.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: xobr219pa.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: xobr219pa.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-05-10T19:58:06.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Malware streamName: OpenDNS Detection clientIP: 247.138.123.165 serverIP: 205.19.253.126 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"188.101.60.50\",\"externalIp\":\"29.153.4.254\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "188.101.60.50", "serverIP": "29.153.4.254", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"188.101.60.50","externalIp":"29.153.4.254","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=188.101.60.50 ::: serverIP=29.153.4.254 ::: userName=fish ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 188.101.60.50 serverIP: 29.153.4.254 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"136.139.92.129\",\"externalIp\":\"112.92.86.166\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "136.139.92.129", "serverIP": "112.92.86.166", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"136.139.92.129","externalIp":"112.92.86.166","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=136.139.92.129 ::: serverIP=112.92.86.166 ::: userName=janedoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 136.139.92.129 serverIP: 112.92.86.166 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"26.183.202.182\",\"externalIp\":\"58.105.252.46\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "26.183.202.182", "serverIP": "58.105.252.46", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"26.183.202.182","externalIp":"58.105.252.46","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=26.183.202.182 ::: serverIP=58.105.252.46 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 26.183.202.182 serverIP: 58.105.252.46 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"194.104.102.234\",\"externalIp\":\"113.120.49.75\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "194.104.102.234", "serverIP": "113.120.49.75", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"194.104.102.234","externalIp":"113.120.49.75","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=194.104.102.234 ::: serverIP=113.120.49.75 ::: userName=johndoe ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 194.104.102.234 serverIP: 113.120.49.75 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"141.219.19.167\",\"externalIp\":\"144.135.53.106\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "141.219.19.167", "serverIP": "144.135.53.106", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"141.219.19.167","externalIp":"144.135.53.106","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=141.219.19.167 ::: serverIP=144.135.53.106 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 141.219.19.167 serverIP: 144.135.53.106 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "dvrtr.innovid.com", "message": "WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={\"originId\":526589532,\"originType\":\"Roaming Computers\",\"internalIp\":\"227.99.30.149\",\"externalIp\":\"5.128.73.189\",\"categories\":[\"Software/Technology\",\"Business Services\",\"Malware\",\"Application\",\"Business and Industry\"],\"tags\":[],\"destination\":\"dvrtr.innovid.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-24T18:15:38.000Z\"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "dvrtr.innovid.com", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-24T18:15:38.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry", "streamName": "OpenDNS Detection", "clientIP": "227.99.30.149", "serverIP": "5.128.73.189", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=dvrtr.innovid.com ::: action=BLOCKED ::: message={"originId":526589532,"originType":"Roaming Computers","internalIp":"227.99.30.149","externalIp":"5.128.73.189","categories":["Software/Technology","Business Services","Malware","Application","Business and Industry"],"tags":[],"destination":"dvrtr.innovid.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-10-24T18:15:38.000Z"} ::: clientIP=227.99.30.149 ::: serverIP=5.128.73.189 ::: userName=nighthawk ::: created_at=2022-10-24T18:15:38.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-24T18:15:38.000Z ::: serverHostname=dvrtr.innovid.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: dvrtr.innovid.com messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: dvrtr.innovid.com severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-24T18:15:38.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: Software/TechnologyBusiness ServicesMalwareApplicationBusiness and Industry streamName: OpenDNS Detection clientIP: 227.99.30.149 serverIP: 5.128.73.189 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T19:36:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"209.96.213.165\",\"externalIp\":\"27.123.141.216\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "209.96.213.165", "serverIP": "27.123.141.216", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"209.96.213.165","externalIp":"27.123.141.216","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=209.96.213.165 ::: serverIP=27.123.141.216 ::: userName=charlie ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T19:36:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 209.96.213.165 serverIP: 27.123.141.216 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T19:36:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"157.21.17.82\",\"externalIp\":\"180.175.245.247\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "157.21.17.82", "serverIP": "180.175.245.247", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"157.21.17.82","externalIp":"180.175.245.247","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=157.21.17.82 ::: serverIP=180.175.245.247 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T19:36:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 157.21.17.82 serverIP: 180.175.245.247 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T20:03:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"41.149.6.223\",\"externalIp\":\"182.245.193.199\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "41.149.6.223", "serverIP": "182.245.193.199", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"41.149.6.223","externalIp":"182.245.193.199","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=41.149.6.223 ::: serverIP=182.245.193.199 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T20:03:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 41.149.6.223 serverIP: 182.245.193.199 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T20:03:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"31.193.156.155\",\"externalIp\":\"151.234.141.147\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "31.193.156.155", "serverIP": "151.234.141.147", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"31.193.156.155","externalIp":"151.234.141.147","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=31.193.156.155 ::: serverIP=151.234.141.147 ::: userName=janedoe ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T20:03:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 31.193.156.155 serverIP: 151.234.141.147 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T19:36:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"65.227.72.74\",\"externalIp\":\"91.13.219.214\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "65.227.72.74", "serverIP": "91.13.219.214", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"65.227.72.74","externalIp":"91.13.219.214","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=65.227.72.74 ::: serverIP=91.13.219.214 ::: userName=nighthawk ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T19:36:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 65.227.72.74 serverIP: 91.13.219.214 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T19:36:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"113.30.226.165\",\"externalIp\":\"24.84.63.141\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "113.30.226.165", "serverIP": "24.84.63.141", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"113.30.226.165","externalIp":"24.84.63.141","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=113.30.226.165 ::: serverIP=24.84.63.141 ::: userName=fish ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-06-28T19:36:52.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 113.30.226.165 serverIP: 24.84.63.141 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T20:03:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"114.232.42.176\",\"externalIp\":\"225.63.84.153\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "114.232.42.176", "serverIP": "225.63.84.153", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"114.232.42.176","externalIp":"225.63.84.153","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=114.232.42.176 ::: serverIP=225.63.84.153 ::: userName=charlie ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T20:03:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 114.232.42.176 serverIP: 225.63.84.153 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-23T20:03:16.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"130.118.194.85\",\"externalIp\":\"178.46.141.197\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-23T20:03:16.000Z\"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "130.118.194.85", "serverIP": "178.46.141.197", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"130.118.194.85","externalIp":"178.46.141.197","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-05-23T20:03:16.000Z"} ::: clientIP=130.118.194.85 ::: serverIP=178.46.141.197 ::: userName=bob ::: created_at=2022-05-23T20:03:16.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-23T20:03:16.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-23T20:03:16.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: search.hdownloadmyinboxhelper.com messagetype: firewall_action severitycode: 2 fqdn: search.hdownloadmyinboxhelper.com vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals action: block streamName: OpenDNS Detection clientIP: 130.118.194.85 serverIP: 178.46.141.197 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"153.45.150.140","externalIp":"36.214.251.166","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-06-28T19:36:52.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={\"originId\":410613954,\"originType\":\"AD Users\",\"internalIp\":\"153.45.150.140\",\"externalIp\":\"36.214.251.166\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"search.hdownloadmyinboxhelper.com\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-28T19:36:52.000Z\"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "search.hdownloadmyinboxhelper.com", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "search.hdownloadmyinboxhelper.com", "vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "153.45.150.140", "serverIP": "36.214.251.166", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=search.hdownloadmyinboxhelper.com ::: action=BLOCKED ::: message={"originId":410613954,"originType":"AD Users","internalIp":"153.45.150.140","externalIp":"36.214.251.166","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"search.hdownloadmyinboxhelper.com","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-28T19:36:52.000Z"} ::: clientIP=153.45.150.140 ::: serverIP=36.214.251.166 ::: userName=johndoe ::: created_at=2022-06-28T19:36:52.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-28T19:36:52.000Z ::: serverHostname=search.hdownloadmyinboxhelper.com ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message