input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
{ "action": "block", "clientport": 53727, "message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "44.94.241.59", "serverIP": "47.5.181.32" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53727 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 44.94.241.59 serverIP: 47.5.181.32
Explain this syslog message
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
{ "action": "block", "clientport": 53727, "message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "252.203.231.34", "serverIP": "16.167.171.254" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53727 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 252.203.231.34 serverIP: 16.167.171.254
Explain this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
{ "action": "block", "clientport": 61666, "message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "90.55.74.175", "serverIP": "219.179.232.44" }
Create a JSON artifact from the message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61666 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 90.55.74.175 serverIP: 219.179.232.44
Explain this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
{ "action": "block", "clientport": 61666, "message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "50.107.172.118", "serverIP": "204.51.35.134" }
Create a JSON artifact from the message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61666 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 50.107.172.118 serverIP: 204.51.35.134
Explain this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
{ "action": "block", "clientport": 61666, "message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "206.140.52.57", "serverIP": "178.26.159.114" }
Create a JSON artifact from the message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61666 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 206.140.52.57 serverIP: 178.26.159.114
Explain this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
{ "action": "block", "clientport": 61666, "message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "201.213.67.231", "serverIP": "218.203.47.41" }
Create a JSON artifact from the message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 61666 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 201.213.67.231 serverIP: 218.203.47.41
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"178.128.197.127\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:20:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "178.128.197.127" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:20:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 178.128.197.127
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"84.234.70.66\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:20:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "84.234.70.66" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:20:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 84.234.70.66
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"247.169.238.254\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:20:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "247.169.238.254" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:20:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 247.169.238.254
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"217.161.237.59\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:20:53.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "217.161.237.59" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:20:53.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 217.161.237.59
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank", "filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@umbrella.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@umbrella.bank\"],\"senderIP\":\"216.6.77.71\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "216.6.77.71" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank filehash: <20230621201952.B077D327384E8DF8@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 216.6.77.71
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank", "filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@oscorp.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@oscorp.bank\"],\"senderIP\":\"154.75.131.53\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "154.75.131.53" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank filehash: <20230621201952.B077D327384E8DF8@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 154.75.131.53
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank", "filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@stark.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@stark.bank\"],\"senderIP\":\"37.3.197.170\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "37.3.197.170" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank filehash: <20230621201952.B077D327384E8DF8@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 37.3.197.170
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "jeffrobinson@myphone.coop", "emailsendingserver": "146.70.155.194", "emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank", "filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>", "filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@wayne.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@wayne.bank\"],\"senderIP\":\"243.55.195.217\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-06-22T03:19:56.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "243.55.195.217" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: jeffrobinson@myphone.coop emailsendingserver: 146.70.155.194 emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank filehash: <20230621201952.B077D327384E8DF8@myphone.coop> filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-06-22T03:19:56.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 243.55.195.217
Explain this syslog message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 42733, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:21:40", "message": "<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "138.165.109.111", "serverIP": "37.141.212.80" }
Create a JSON artifact from the message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 42733 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:21:40 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 138.165.109.111 serverIP: 37.141.212.80
Explain this syslog message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 42733, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:21:40", "message": "<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "78.234.50.161", "serverIP": "252.152.28.105" }
Create a JSON artifact from the message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 42733 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:21:40 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 78.234.50.161 serverIP: 252.152.28.105
Explain this syslog message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 33981, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:22:44", "message": "<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "216.201.219.42", "serverIP": "252.78.40.164" }
Create a JSON artifact from the message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 33981 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:22:44 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 216.201.219.42 serverIP: 252.78.40.164
Explain this syslog message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 33981, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:22:44", "message": "<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "207.23.79.141", "serverIP": "102.22.137.7" }
Create a JSON artifact from the message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 33981 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:22:44 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 207.23.79.141 serverIP: 102.22.137.7
Explain this syslog message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 246, "clientpackets": 1, "clientport": 500, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:19:33", "message": "<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 17, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 500, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 246, "streamName": "pan_firewall", "clientIP": "207.13.159.146", "serverIP": "193.185.180.213" }
Create a JSON artifact from the message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 246 clientpackets: 1 clientport: 500 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:19:33 messagetype: traffic_drop priority: 14 protocol: 17 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 500 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 246 streamName: pan_firewall clientIP: 207.13.159.146 serverIP: 193.185.180.213
Explain this syslog message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 246, "clientpackets": 1, "clientport": 500, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:19:33", "message": "<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 17, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 500, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 246, "streamName": "pan_firewall", "clientIP": "147.5.240.243", "serverIP": "180.139.235.149" }
Create a JSON artifact from the message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 246 clientpackets: 1 clientport: 500 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:19:33 messagetype: traffic_drop priority: 14 protocol: 17 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 500 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 246 streamName: pan_firewall clientIP: 147.5.240.243 serverIP: 180.139.235.149
Explain this syslog message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 47462, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:24:36", "message": "<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 9090, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "128.160.19.168", "serverIP": "237.202.22.236" }
Create a JSON artifact from the message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 47462 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:24:36 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 9090 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 128.160.19.168 serverIP: 237.202.22.236
Explain this syslog message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 47462, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:24:36", "message": "<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 9090, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "236.114.214.66", "serverIP": "255.209.144.167" }
Create a JSON artifact from the message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 47462 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:24:36 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 9090 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 236.114.214.66 serverIP: 255.209.144.167
Explain this syslog message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 43564, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:23:36", "message": "<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "37.146.196.47", "serverIP": "214.177.248.65" }
Create a JSON artifact from the message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 43564 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:23:36 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 37.146.196.47 serverIP: 214.177.248.65
Explain this syslog message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 43564, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:23:36", "message": "<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "84.13.187.105", "serverIP": "110.223.137.85" }
Create a JSON artifact from the message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 43564 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:23:36 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 84.13.187.105 serverIP: 110.223.137.85
Explain this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 65194, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:26:07", "message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "128.118.145.147", "serverIP": "167.169.157.253" }
Create a JSON artifact from the message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 65194 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:26:07 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 128.118.145.147 serverIP: 167.169.157.253
Explain this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 65194, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:26:07", "message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "26.170.19.218", "serverIP": "176.228.147.108" }
Create a JSON artifact from the message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 65194 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:26:07 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 26.170.19.218 serverIP: 176.228.147.108
Explain this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 65194, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:26:07", "message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "39.58.113.80", "serverIP": "216.8.44.113" }
Create a JSON artifact from the message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 65194 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:26:07 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 39.58.113.80 serverIP: 216.8.44.113
Explain this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 65194, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:26:07", "message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 23, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "71.1.192.120", "serverIP": "122.248.175.48" }
Create a JSON artifact from the message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 65194 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:26:07 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 23 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 71.1.192.120 serverIP: 122.248.175.48
Explain this syslog message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 80, "clientpackets": 1, "clientport": 10686, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:31:16", "message": "<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 17, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 53, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 80, "streamName": "pan_firewall", "clientIP": "107.246.121.132", "serverIP": "97.209.157.238" }
Create a JSON artifact from the message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 80 clientpackets: 1 clientport: 10686 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:31:16 messagetype: traffic_drop priority: 14 protocol: 17 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 53 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 80 streamName: pan_firewall clientIP: 107.246.121.132 serverIP: 97.209.157.238
Explain this syslog message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 80, "clientpackets": 1, "clientport": 10686, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:31:16", "message": "<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 17, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 53, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 80, "streamName": "pan_firewall", "clientIP": "57.103.97.195", "serverIP": "53.189.235.243" }
Create a JSON artifact from the message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 80 clientpackets: 1 clientport: 10686 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:31:16 messagetype: traffic_drop priority: 14 protocol: 17 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 53 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 80 streamName: pan_firewall clientIP: 57.103.97.195 serverIP: 53.189.235.243
Explain this syslog message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 46935, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:25:31", "message": "<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 21520, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "251.191.198.82", "serverIP": "27.11.241.125" }
Create a JSON artifact from the message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 46935 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:25:31 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 21520 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 251.191.198.82 serverIP: 27.11.241.125
Explain this syslog message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 46935, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:25:31", "message": "<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 21520, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "105.22.58.114", "serverIP": "187.115.151.181" }
Create a JSON artifact from the message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 46935 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:25:31 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 21520 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 105.22.58.114 serverIP: 187.115.151.181
Explain this syslog message
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 43586, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:25:41", "message": "<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 17730, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "183.225.134.245", "serverIP": "166.177.148.108" }
Create a JSON artifact from the message
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 43586 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Jun 21 21:25:41 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 17730 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 183.225.134.245 serverIP: 166.177.148.108
Explain this syslog message
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,56.3.176.205,171.223.83.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 43586, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Jun 21 21:25:41", "message": "<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,56.3.176.205,171.223.83.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 17730, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "56.3.176.205", "serverIP": "171.223.83.227" }
Create a JSON artifact from the message