input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53727,
"message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "44.94.241.59",
"serverIP": "47.5.181.32"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=44.94.241.59 dst=47.5.181.32 protocol=tcp sport=53727 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53727
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 44.94.241.59
serverIP: 47.5.181.32
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53727,
"message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "252.203.231.34",
"serverIP": "16.167.171.254"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=252.203.231.34 dst=16.167.171.254 protocol=tcp sport=53727 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53727
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 252.203.231.34
serverIP: 16.167.171.254
|
Explain this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 61666,
"message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.55.74.175",
"serverIP": "219.179.232.44"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=90.55.74.175 dst=219.179.232.44 protocol=tcp sport=61666 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 61666
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.55.74.175
serverIP: 219.179.232.44
|
Explain this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 61666,
"message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "50.107.172.118",
"serverIP": "204.51.35.134"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=50.107.172.118 dst=204.51.35.134 protocol=tcp sport=61666 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 61666
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 50.107.172.118
serverIP: 204.51.35.134
|
Explain this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 61666,
"message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "206.140.52.57",
"serverIP": "178.26.159.114"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=206.140.52.57 dst=178.26.159.114 protocol=tcp sport=61666 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 61666
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 206.140.52.57
serverIP: 178.26.159.114
|
Explain this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 61666,
"message": "<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "201.213.67.231",
"serverIP": "218.203.47.41"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.76.5.213 1 1688224730.769020002 M51_MX67C_Mobile l7_firewall src=201.213.67.231 dst=218.203.47.41 protocol=tcp sport=61666 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 61666
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 201.213.67.231
serverIP: 218.203.47.41
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"178.128.197.127\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:20:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "178.128.197.127"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"178.128.197.127","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=178.128.197.127 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=178.128.197.127 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:20:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 178.128.197.127
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"84.234.70.66\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:20:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "84.234.70.66"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"84.234.70.66","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=84.234.70.66 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=84.234.70.66 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:20:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 84.234.70.66
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"247.169.238.254\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:20:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "247.169.238.254"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"247.169.238.254","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=247.169.238.254 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=247.169.238.254 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:20:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 247.169.238.254
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"filehash": "<20230621202048.A04F43E4EB296B2F@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:20:53.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":12005,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"dbanjac@sandiegoprivatebank.net\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6\",\"md5\":\"c5f43503fd72a2a8e6c24c279566bb0f\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"c28dd183-872c-309d-b55a-7252f88b92bd\",\"QID\":\"3r9b7e9sjs-1\",\"GUID\":\"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"dbanjac@sandiegoprivatebank.net\"],\"senderIP\":\"217.161.237.59\",\"messageID\":\"<20230621202048.A04F43E4EB296B2F@myphone.coop>\"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:20:53.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "217.161.237.59"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:20:53.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":12005,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["dbanjac@sandiegoprivatebank.net"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"1de79a0bf82b303b524f2d80c97044f427ce071963e56f40950a5bfdab0031e6","md5":"c5f43503fd72a2a8e6c24c279566bb0f","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"c28dd183-872c-309d-b55a-7252f88b92bd","QID":"3r9b7e9sjs-1","GUID":"qIYTtsY3xV6ksnUw10KIdOOtx_g3L_0k","sender":"jeffrobinson@myphone.coop","recipient":["dbanjac@sandiegoprivatebank.net"],"senderIP":"217.161.237.59","messageID":"<20230621202048.A04F43E4EB296B2F@myphone.coop>"} ::: fileHash=<20230621202048.A04F43E4EB296B2F@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: serverIP=217.161.237.59 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:20:53.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:20:53.000Z ::: emailSendingServer=217.161.237.59 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
filehash: <20230621202048.A04F43E4EB296B2F@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirydbanjac@sandiegoprivatebank.net
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:20:53.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 217.161.237.59
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank",
"filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@umbrella.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@umbrella.bank\"],\"senderIP\":\"216.6.77.71\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "216.6.77.71"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"RE: Purchase order & payment inquirymkelee@umbrella.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@umbrella.bank"],"senderIP":"216.6.77.71","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@umbrella.bank ::: serverIP=216.6.77.71 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@umbrella.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=216.6.77.71 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank
filehash: <20230621201952.B077D327384E8DF8@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 216.6.77.71
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank",
"filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@oscorp.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@oscorp.bank\"],\"senderIP\":\"154.75.131.53\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "154.75.131.53"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"RE: Purchase order & payment inquirymkelee@oscorp.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@oscorp.bank"],"senderIP":"154.75.131.53","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@oscorp.bank ::: serverIP=154.75.131.53 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@oscorp.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=154.75.131.53 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank
filehash: <20230621201952.B077D327384E8DF8@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 154.75.131.53
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank",
"filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"stark_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@stark.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@stark.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@stark.bank\"],\"senderIP\":\"37.3.197.170\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "37.3.197.170"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"stark_hosted","subject":"RE: Purchase order & payment inquirymkelee@stark.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@stark.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@stark.bank"],"senderIP":"37.3.197.170","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@stark.bank ::: serverIP=37.3.197.170 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@stark.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=37.3.197.170 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank
filehash: <20230621201952.B077D327384E8DF8@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 37.3.197.170
|
Explain this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
|
{
"action": "block",
"emailfrom": "jeffrobinson@myphone.coop",
"emailsendingserver": "146.70.155.194",
"emailsubject": "RE: Purchase order & payment inquirymkelee@calprivate.bank",
"filehash": "<20230621201952.B077D327384E8DF8@myphone.coop>",
"filename": "from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank",
"message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":100,\"phishScore\":100,\"threatsInfoMap\":[{\"threatID\":\"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5\",\"threatTime\":\"2023-06-21T23:22:41.000Z\",\"threat\":\"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-06-22T03:19:56.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"RE: Purchase order & payment inquirymkelee@wayne.bank\",\"quarantineFolder\":\"Phish\",\"quarantineRule\":\"inbound_phish\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"zerohour\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":11960,\"headerFrom\":\"\\\"Credit control\\\"<jeffrobinson@myphone.coop>\",\"headerReplyTo\":\"\\\"Credit control\\\"<skyb3nder@gmail.com>\",\"fromAddress\":[\"jeffrobinson@myphone.coop\"],\"ccAddresses\":[],\"replyToAddress\":[\"b621e8b2268c5382e7e3dd7643a997b1@gmail.com>\"],\"toAddresses\":[\"mkelee@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a\",\"md5\":\"86bfc2e21ba729f9db5055e9dfd56b2e\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"18371a3d-8254-daca-163b-6d47f5d13d63\",\"QID\":\"3r98ptshg2-1\",\"GUID\":\"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD\",\"sender\":\"jeffrobinson@myphone.coop\",\"recipient\":[\"mkelee@wayne.bank\"],\"senderIP\":\"243.55.195.217\",\"messageID\":\"<20230621201952.B077D327384E8DF8@myphone.coop>\"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch",
"messagetype": "email_protection_event",
"productids": [
32
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-22T03:19:56.000Z",
"tags": [
"proofpoint_protect",
"email_protection_event"
],
"vendorcode": "blocked_message",
"streamName": "proofpoint_protect",
"serverIP": "243.55.195.217"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
|
Product: Protect
Vendor: ProofPoint
|
Identify this syslog message
|
WitFoo-Artifact ::: action=block ::: message={"spamScore":100,"phishScore":100,"threatsInfoMap":[{"threatID":"f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/f34c7acc128cd0a3c8409a6f00108752fc3373ab290acdc9be2f2ecfe99feaf5","threatTime":"2023-06-21T23:22:41.000Z","threat":"https://tpugiealpe666kppcromxu5y5bcx7rfg7q5j3y2vlfglv5mjunta.arweave.net/m-hkEAt5Pe8p7xRcy9O46EV_xKb8Op3jVVlMuvWJo2Y","campaignID":null,"threatType":"url"}],"messageTime":"2023-06-22T03:19:56.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"RE: Purchase order & payment inquirymkelee@wayne.bank","quarantineFolder":"Phish","quarantineRule":"inbound_phish","policyRoutes":["default_inbound"],"modulesRun":["av","zerohour","spf","spam","dmarc","pdr","urldefense"],"messageSize":11960,"headerFrom":"\"Credit control\"<jeffrobinson@myphone.coop>","headerReplyTo":"\"Credit control\"<skyb3nder@gmail.com>","fromAddress":["jeffrobinson@myphone.coop"],"ccAddresses":[],"replyToAddress":["b621e8b2268c5382e7e3dd7643a997b1@gmail.com>"],"toAddresses":["mkelee@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"80ee8b55aba4511f5b154b9b27d3d9f17bbb7b5f190da43b77b28f4b3dca975a","md5":"86bfc2e21ba729f9db5055e9dfd56b2e","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"18371a3d-8254-daca-163b-6d47f5d13d63","QID":"3r98ptshg2-1","GUID":"qDJcv7TxR1IDgThRL5BluyedYy3q4GvD","sender":"jeffrobinson@myphone.coop","recipient":["mkelee@wayne.bank"],"senderIP":"243.55.195.217","messageID":"<20230621201952.B077D327384E8DF8@myphone.coop>"} ::: fileHash=<20230621201952.B077D327384E8DF8@myphone.coop> ::: fileName=from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@wayne.bank ::: serverIP=243.55.195.217 ::: emailFrom=jeffrobinson@myphone.coop ::: created_at=2023-06-22T03:19:56.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=RE: Purchase order & payment inquirymkelee@wayne.bank ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-06-22T03:19:56.000Z ::: emailSendingServer=243.55.195.217 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message:
action: block
emailfrom: jeffrobinson@myphone.coop
emailsendingserver: 146.70.155.194
emailsubject: RE: Purchase order & payment inquirymkelee@calprivate.bank
filehash: <20230621201952.B077D327384E8DF8@myphone.coop>
filename: from: jeffrobinson@myphone.coop subj: RE: Purchase order & payment inquirymkelee@calprivate.bank
messagetype: email_protection_event
productids: [32]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
starttimeutc: 2023-06-22T03:19:56.000Z
tags: ['proofpoint_protect', 'email_protection_event']
vendorcode: blocked_message
streamName: proofpoint_protect
serverIP: 243.55.195.217
|
Explain this syslog message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42733,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:21:40",
"message": "<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "138.165.109.111",
"serverIP": "37.141.212.80"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,138.165.109.111,37.141.212.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42733
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:21:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 138.165.109.111
serverIP: 37.141.212.80
|
Explain this syslog message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42733,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:21:40",
"message": "<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "78.234.50.161",
"serverIP": "252.152.28.105"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:21:40 DC1-PA3220-1 1,2023/06/21 21:21:40,016201032964,TRAFFIC,drop,2560,2023/06/21 21:21:40,78.234.50.161,252.152.28.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:21:40,0,1,42733,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:21:39,0,any,0,5767057438,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:21:40.499-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42733
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:21:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 78.234.50.161
serverIP: 252.152.28.105
|
Explain this syslog message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 33981,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:22:44",
"message": "<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "216.201.219.42",
"serverIP": "252.78.40.164"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,216.201.219.42,252.78.40.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 33981
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:22:44
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 216.201.219.42
serverIP: 252.78.40.164
|
Explain this syslog message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 33981,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:22:44",
"message": "<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "207.23.79.141",
"serverIP": "102.22.137.7"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:22:44 DC1-PA3220-1 1,2023/06/21 21:22:44,016201032964,TRAFFIC,drop,2560,2023/06/21 21:22:44,207.23.79.141,102.22.137.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:22:44,0,1,33981,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:22:43,0,any,0,5767063101,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:22:44.511-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 33981
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:22:44
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 207.23.79.141
serverIP: 102.22.137.7
|
Explain this syslog message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 246,
"clientpackets": 1,
"clientport": 500,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:19:33",
"message": "<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 500,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 246,
"streamName": "pan_firewall",
"clientIP": "207.13.159.146",
"serverIP": "193.185.180.213"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,207.13.159.146,193.185.180.213,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 246
clientpackets: 1
clientport: 500
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:19:33
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 500
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 246
streamName: pan_firewall
clientIP: 207.13.159.146
serverIP: 193.185.180.213
|
Explain this syslog message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 246,
"clientpackets": 1,
"clientport": 500,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:19:33",
"message": "<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 500,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 246,
"streamName": "pan_firewall",
"clientIP": "147.5.240.243",
"serverIP": "180.139.235.149"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:19:33 DC1-PA3220-1 1,2023/06/21 21:19:33,016201032964,TRAFFIC,drop,2560,2023/06/21 21:19:33,147.5.240.243,180.139.235.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:19:33,0,1,500,500,0,0,0x0,udp,deny,246,246,0,1,2023/06/21 21:19:32,0,any,0,5767045897,0x0,Ukraine,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:19:33.473-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 246
clientpackets: 1
clientport: 500
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:19:33
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 500
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 246
streamName: pan_firewall
clientIP: 147.5.240.243
serverIP: 180.139.235.149
|
Explain this syslog message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47462,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:24:36",
"message": "<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9090,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "128.160.19.168",
"serverIP": "237.202.22.236"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,128.160.19.168,237.202.22.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47462
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:24:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9090
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 128.160.19.168
serverIP: 237.202.22.236
|
Explain this syslog message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47462,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:24:36",
"message": "<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9090,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "236.114.214.66",
"serverIP": "255.209.144.167"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:24:36 DC1-PA3220-1 1,2023/06/21 21:24:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:24:36,236.114.214.66,255.209.144.167,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:24:36,0,1,47462,9090,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:24:35,0,any,0,5767073227,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:24:36.534-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47462
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:24:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9090
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 236.114.214.66
serverIP: 255.209.144.167
|
Explain this syslog message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43564,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:23:36",
"message": "<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "37.146.196.47",
"serverIP": "214.177.248.65"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,37.146.196.47,214.177.248.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43564
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:23:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 37.146.196.47
serverIP: 214.177.248.65
|
Explain this syslog message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43564,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:23:36",
"message": "<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "84.13.187.105",
"serverIP": "110.223.137.85"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:23:36 DC1-PA3220-1 1,2023/06/21 21:23:36,016201032964,TRAFFIC,drop,2560,2023/06/21 21:23:36,84.13.187.105,110.223.137.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/06/21 21:23:36,0,1,43564,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:23:35,0,any,0,5767068078,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:23:36.522-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43564
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:23:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 84.13.187.105
serverIP: 110.223.137.85
|
Explain this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 65194,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:26:07",
"message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "128.118.145.147",
"serverIP": "167.169.157.253"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,128.118.145.147,167.169.157.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 65194
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:26:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 128.118.145.147
serverIP: 167.169.157.253
|
Explain this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 65194,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:26:07",
"message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "26.170.19.218",
"serverIP": "176.228.147.108"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,26.170.19.218,176.228.147.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 65194
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:26:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 26.170.19.218
serverIP: 176.228.147.108
|
Explain this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 65194,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:26:07",
"message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "39.58.113.80",
"serverIP": "216.8.44.113"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,39.58.113.80,216.8.44.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 65194
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:26:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 39.58.113.80
serverIP: 216.8.44.113
|
Explain this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 65194,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:26:07",
"message": "<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "71.1.192.120",
"serverIP": "122.248.175.48"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:26:07 DC1-PA3220-1 1,2023/06/21 21:26:07,016201032964,TRAFFIC,drop,2560,2023/06/21 21:26:07,71.1.192.120,122.248.175.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:26:07,0,1,65194,23,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:26:06,0,any,0,5767081885,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:26:07.552-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 65194
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:26:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 71.1.192.120
serverIP: 122.248.175.48
|
Explain this syslog message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 80,
"clientpackets": 1,
"clientport": 10686,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:31:16",
"message": "<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 80,
"streamName": "pan_firewall",
"clientIP": "107.246.121.132",
"serverIP": "97.209.157.238"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,107.246.121.132,97.209.157.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 80
clientpackets: 1
clientport: 10686
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:31:16
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 53
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 80
streamName: pan_firewall
clientIP: 107.246.121.132
serverIP: 97.209.157.238
|
Explain this syslog message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 80,
"clientpackets": 1,
"clientport": 10686,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:31:16",
"message": "<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 80,
"streamName": "pan_firewall",
"clientIP": "57.103.97.195",
"serverIP": "53.189.235.243"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:31:16 DC1-PA3220-1 1,2023/06/21 21:31:16,016201032964,TRAFFIC,drop,2560,2023/06/21 21:31:16,57.103.97.195,53.189.235.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:31:16,0,1,10686,53,0,0,0x0,udp,deny,80,80,0,1,2023/06/21 21:31:15,0,any,0,5767110808,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:31:16.615-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 80
clientpackets: 1
clientport: 10686
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:31:16
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 53
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 80
streamName: pan_firewall
clientIP: 57.103.97.195
serverIP: 53.189.235.243
|
Explain this syslog message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46935,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:25:31",
"message": "<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 21520,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "251.191.198.82",
"serverIP": "27.11.241.125"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,251.191.198.82,27.11.241.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46935
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:25:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 21520
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 251.191.198.82
serverIP: 27.11.241.125
|
Explain this syslog message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46935,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:25:31",
"message": "<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 21520,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "105.22.58.114",
"serverIP": "187.115.151.181"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:25:31 DC1-PA3220-1 1,2023/06/21 21:25:31,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:31,105.22.58.114,187.115.151.181,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:31,0,1,46935,21520,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:30,0,any,0,5767078589,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:31.545-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46935
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:25:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 21520
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 105.22.58.114
serverIP: 187.115.151.181
|
Explain this syslog message
|
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43586,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:25:41",
"message": "<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17730,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "183.225.134.245",
"serverIP": "166.177.148.108"
}
|
Create a JSON artifact from the message
|
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,183.225.134.245,166.177.148.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43586
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 21 21:25:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17730
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 183.225.134.245
serverIP: 166.177.148.108
|
Explain this syslog message
|
<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,56.3.176.205,171.223.83.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43586,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 21 21:25:41",
"message": "<14>Jun 21 21:25:41 DC1-PA3220-1 1,2023/06/21 21:25:41,016201032964,TRAFFIC,drop,2560,2023/06/21 21:25:41,56.3.176.205,171.223.83.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/21 21:25:41,0,1,43586,17730,0,0,0x0,tcp,deny,60,60,0,1,2023/06/21 21:25:40,0,any,0,5767079607,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-21T21:25:41.547-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17730,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "56.3.176.205",
"serverIP": "171.223.83.227"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.