timestamp float64 1.65B 1.72B | message_type large_stringclasses 294
values | stream_name large_stringclasses 75
values | pipeline large_stringclasses 4
values | src_ip large_stringlengths 0 38 β | dst_ip large_stringlengths 0 15 β | src_port large_stringlengths 0 5 β | dst_port large_stringlengths 0 5 β | protocol large_stringclasses 7
values | src_host large_stringclasses 152
values | dst_host large_stringclasses 17
values | username large_stringlengths 0 9 β | action large_stringclasses 40
values | severity large_stringclasses 10
values | vendor_code large_stringlengths 0 73 β | message_sanitized large_stringlengths 0 77k | label_binary large_stringclasses 3
values | label_confidence float64 0.5 0.99 | attack_techniques large_stringclasses 1
value | attack_tactics large_stringclasses 1
value | mo_name large_stringclasses 3
values | suspicion_score float64 0 0.99 | lifecycle_stage large_stringclasses 4
values | matched_rules large_stringclasses 4
values | set_roles large_stringclasses 2
values | product_name large_stringclasses 18
values | vendor_name large_stringclasses 13
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1,653,921,825 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0335.domain-0022.example.net | USER-1420 | block | critical | HOST-3794mining | ORG-1780 ::: fqdn=USER-0010-0335.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-3794mining"],"tags":[],"destination":"USER-0010-0335.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-05-30T14:43:45.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-3794mining ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-05-30T14:43:45.000Z ::: serverUSER-0010name=USER-0010-0335.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,653,921,825 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0335.domain-0022.example.net | USER-1420 | block | critical | HOST-3794mining | ORG-1780 ::: fqdn=USER-0010-0335.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-3794mining"],"tags":[],"destination":"USER-0010-0335.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-05-30T14:43:45.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-3794mining ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-05-30T14:43:45.000Z ::: serverUSER-0010name=USER-0010-0335.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,653,921,825 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0335.domain-0022.example.net | USER-1420 | block | critical | HOST-3794mining | ORG-1780 ::: fqdn=USER-0010-0335.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-3794mining"],"tags":[],"destination":"USER-0010-0335.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-05-30T14:43:45.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-3794mining ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-05-30T14:43:45.000Z ::: serverUSER-0010name=USER-0010-0335.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,653,921,825 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0335.domain-0022.example.net | USER-1420 | block | critical | HOST-3794mining | ORG-1780 ::: fqdn=USER-0010-0335.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-3794mining"],"tags":[],"destination":"USER-0010-0335.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-05-30T14:43:45.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-05-30T14:43:45.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-3794mining ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-05-30T14:43:45.000Z ::: serverUSER-0010name=USER-0010-0335.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,654,626,566 | firewall_action | OpenDNS Detection | syslog | 192.168.147.151 | 100.64.30.212 | null | null | null | HOST-0079 | USER-0010-0449.domain-0022.example.net | USER-1420 | block | critical | HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals | ORG-1780 ::: fqdn=USER-0010-0449.domain-0022.example.net ::: HOST-0121=BLOCKED ::: CRED-23501={"originId":410614338,"originType":"AD CRED-0339","HOST-55459Ip":"192.168.147.151","externalIp":"100.64.30.212","categories":["HOST-54163 HOST-54456","Potentially Harmful","HOST-54163 HOST-54456 and Portals"],"tags":[],"destination":"USER-0010-0449.domain-0022.example.net","originLUSER-8584":"USER-0016 ORG-0090 (user-1115@exampleUSER-8710)","HOST-0121Taken":"BLOCKED","ORG-11677ORG-1526":"2022-06-07T18:29:26.000Z"} ::: USER-8159IP=192.168.147.151 ::: serverIP=100.64.30.212 ::: userName=USER-0016 ORG-0090 (user-1115@exampleUSER-8710) ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=HOST-1731 Detection ::: ORG-4092Code=HOST-54163 HOST-54456Potentially HarmfulHOST-54163 HOST-54456 and Portals ::: CRED-23501Type=firewall_HOST-0121 ::: HOST-55040lineName=HOST-1731 Detection ::: severityCode=2 ::: startORG-1526UTC=2022-06-07T18:29:26.000Z ::: serverUSER-0010name=USER-0010-0449.domain-0022.example.net ::: HOST-55040lineEntrypoint=dispatch | malicious | 0.929688 | [] | [] | Data Theft | 0.929688 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.38 | 100.64.31.22 | 20926 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.539CRED-282457 ORG-0891_MX400_1 flows src=100.64.34.38 dst=100.64.31.22 protocol=tcp sport=20926 dport=8383 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.38 | 100.64.31.22 | 20926 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.539CRED-282457 ORG-0891_MX400_1 flows src=100.64.34.38 dst=100.64.31.22 protocol=tcp sport=20926 dport=8383 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.38 | 100.64.31.22 | 20926 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.539CRED-282457 ORG-0891_MX400_1 flows src=100.64.34.38 dst=100.64.31.22 protocol=tcp sport=20926 dport=8383 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.38.78 | 100.64.35.212 | 59978 | 6003 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.38.78 1 CRED-2712866174.CRED-2571510636 M82_MX67C_ORG-4397 flows src=100.64.35.212 dst=100.64.38.78 protocol=udp sport=6003 dport=5CRED-31062 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.57 | 100.64.31.22 | 64459 | 443 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.8CRED-24996CRED-30397 ORG-0891_MX400_1 flows src=100.64.34.57 dst=100.64.31.22 protocol=tcp sport=64459 dport=443 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,535 | flow | meraki | syslog | 100.64.34.38 | 100.64.31.22 | 20926 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866174.539CRED-282457 ORG-0891_MX400_1 flows src=100.64.34.38 dst=100.64.31.22 protocol=tcp sport=20926 dport=8383 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.98 | 100.64.30.66 | 32553 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.735CRED-3043575 ORG-0891_MX400_1 flows src=100.64.31.98 dst=100.64.30.66 protocol=tcp sport=32553 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.33.47 | 100.64.30.66 | 62414 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.725CRED-272108 ORG-0891_MX400_1 flows src=100.64.33.47 dst=100.64.30.66 protocol=tcp sport=62414 dport=8383 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.33.47 | 100.64.30.66 | 62414 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.725CRED-272108 ORG-0891_MX400_1 flows src=100.64.33.47 dst=100.64.30.66 protocol=tcp sport=62414 dport=8383 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.66 | 100.64.34.97 | 4104 | 4104 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-30730CRED-308864 ORG-0891_MX400_1 flows src=100.64.34.97 dst=100.64.30.66 protocol=udp sport=4104 dport=4104 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.38 | 100.64.30.66 | 28275 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.44CRED-23949263 ORG-0891_MX400_1 flows src=100.64.31.38 dst=100.64.30.66 protocol=tcp sport=CRED-298415 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.35.25 | 100.64.30.66 | 18200 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-2517076549 ORG-0891_MX400_1 flows src=100.64.35.25 dst=100.64.30.66 protocol=tcp sport=18200 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.38 | 100.64.30.66 | 28275 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.44CRED-23949263 ORG-0891_MX400_1 flows src=100.64.31.38 dst=100.64.30.66 protocol=tcp sport=CRED-298415 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.98 | 100.64.30.66 | 32553 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.735CRED-3043575 ORG-0891_MX400_1 flows src=100.64.31.98 dst=100.64.30.66 protocol=tcp sport=32553 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.66 | 100.64.34.97 | 4104 | 4104 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-30730CRED-308864 ORG-0891_MX400_1 flows src=100.64.34.97 dst=100.64.30.66 protocol=udp sport=4104 dport=4104 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.33.47 | 100.64.30.66 | 62414 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.725CRED-272108 ORG-0891_MX400_1 flows src=100.64.33.47 dst=100.64.30.66 protocol=tcp sport=62414 dport=8383 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.33.47 | 100.64.30.66 | 62414 | 8383 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.725CRED-272108 ORG-0891_MX400_1 flows src=100.64.33.47 dst=100.64.30.66 protocol=tcp sport=62414 dport=8383 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.66 | 100.64.34.97 | 4104 | 4104 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-30730CRED-308864 ORG-0891_MX400_1 flows src=100.64.34.97 dst=100.64.30.66 protocol=udp sport=4104 dport=4104 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.98 | 100.64.30.66 | 32553 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.735CRED-3043575 ORG-0891_MX400_1 flows src=100.64.31.98 dst=100.64.30.66 protocol=tcp sport=32553 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.80 | 100.64.30.66 | 12641 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866070.3CRED-29934954 ORG-0891_MX400_1 flows src=100.64.38.80 dst=100.64.30.66 protocol=tcp sport=CRED-296571 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.66 | 100.64.34.97 | 4104 | 4104 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-30730CRED-308864 ORG-0891_MX400_1 flows src=100.64.34.97 dst=100.64.30.66 protocol=udp sport=4104 dport=4104 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.80 | 100.64.30.66 | 12641 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866070.3CRED-29934954 ORG-0891_MX400_1 flows src=100.64.38.80 dst=100.64.30.66 protocol=tcp sport=CRED-296571 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.35.25 | 100.64.30.66 | 18200 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-2517076549 ORG-0891_MX400_1 flows src=100.64.35.25 dst=100.64.30.66 protocol=tcp sport=18200 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.35.25 | 100.64.30.66 | 18200 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-2517076549 ORG-0891_MX400_1 flows src=100.64.35.25 dst=100.64.30.66 protocol=tcp sport=18200 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.38 | 100.64.30.66 | 28275 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.44CRED-23949263 ORG-0891_MX400_1 flows src=100.64.31.38 dst=100.64.30.66 protocol=tcp sport=CRED-298415 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.35.25 | 100.64.30.66 | 18200 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.CRED-2517076549 ORG-0891_MX400_1 flows src=100.64.35.25 dst=100.64.30.66 protocol=tcp sport=18200 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.80 | 100.64.30.66 | 12641 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866070.3CRED-29934954 ORG-0891_MX400_1 flows src=100.64.38.80 dst=100.64.30.66 protocol=tcp sport=CRED-296571 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.80 | 100.64.30.66 | 12641 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866070.3CRED-29934954 ORG-0891_MX400_1 flows src=100.64.38.80 dst=100.64.30.66 protocol=tcp sport=CRED-296571 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.98 | 100.64.30.66 | 32553 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.735CRED-3043575 ORG-0891_MX400_1 flows src=100.64.31.98 dst=100.64.30.66 protocol=tcp sport=32553 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.31.38 | 100.64.30.66 | 28275 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866068.44CRED-23949263 ORG-0891_MX400_1 flows src=100.64.31.38 dst=100.64.30.66 protocol=tcp sport=CRED-298415 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.30.141 | 100.64.30.66 | 32801 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.749177433 ORG-0891_MX400_1 flows src=100.64.30.141 dst=100.64.30.66 protocol=tcp sport=3CRED-29835 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,105,539 | flow | meraki | syslog | 100.64.38.79 | 100.64.30.66 | 16064 | 25 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-2712866067.80453CRED-30898 ORG-0891_MX400_1 flows src=100.64.38.79 dst=100.64.30.66 protocol=tcp sport=CRED-32203 dport=25 pattern: 1 dst 100.64.30.66 | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,115,999 | flow | meraki | syslog | 100.64.30.248 | 100.64.30.225 | 60001 | 59454 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-2712868926.48CRED-30311973 M34_MX67C_ORG-4044 flows src=100.64.30.225 dst=100.64.30.248 protocol=tcp sport=59454 dport=60001 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.30.212 | 100.64.37.202 | 57775 | 42323 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-271286CRED-30862.CRED-3104235854 ORG-0891_MX400_1 flows src=100.64.37.202 dst=100.64.30.212 protocol=udp sport=42323 dport=57775 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.30.212 | 100.64.37.202 | 57775 | 42323 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-271286CRED-30862.CRED-3104235854 ORG-0891_MX400_1 flows src=100.64.37.202 dst=100.64.30.212 protocol=udp sport=42323 dport=57775 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.30.212 | 100.64.37.202 | 57775 | 42323 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-271286CRED-30862.CRED-3104235854 ORG-0891_MX400_1 flows src=100.64.37.202 dst=100.64.30.212 protocol=udp sport=42323 dport=57775 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.36.79 | 100.64.37.202 | 49322 | 9092 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.37.202 1 CRED-2712869009.0CRED-252243916 M72_MX67C_ORG-4405 flows src=100.64.36.79 dst=100.64.37.202 protocol=tcp sport=4CRED-25598 dport=9092 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,174 | flow | meraki | syslog | 100.64.30.212 | 100.64.37.202 | 57775 | 42323 | 17 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=192.168.231.251 1 CRED-271286CRED-30862.CRED-3104235854 ORG-0891_MX400_1 flows src=100.64.37.202 dst=100.64.30.212 protocol=udp sport=42323 dport=57775 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] | ||
1,655,116,208 | flow | meraki | syslog | 100.64.1.47 | 100.64.30.248 | 35823 | 8319 | 6 | 192.168.171.91 | null | null | block | null | null | <134>Original Address=100.64.30.168 1 CRED-27128CRED-304357.08CRED-2981253 M34_MX67C_ORG-4044 flows src=100.64.1.47 dst=100.64.30.248 protocol=tcp sport=35823 dport=CRED-30700 pattern: 1 all | malicious | 0.5 | [] | [] | Data Theft | 0.25 | complete-mission | [] | [] |
WitFoo Precinct6 Cybersecurity Dataset
Overview
A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by WitFoo Precinct version 6.x. The dataset contains 2.07 million sanitized security events (signal logs) and provenance graphs (10,442 incident graphs with 30,092 nodes and 595,618 edges) from real enterprise network monitoring across multiple organizations.
Available in two sizes:
witfoo/precinct6-cybersecurityβ 2M signals (this dataset)witfoo/precinct6-cybersecurity-100mβ 114M signals (same methodology, larger extraction)
Generate your own: WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: witfoo/dataset-from-precinct6
This dataset is designed to support research in:
- Provenance graph-based intrusion detection (KnowHow, NodLink, and similar systems)
- AI-driven cyber defense simulation (CybORG and MARL-based defense policy training)
- Security alert classification (malicious vs. suspicious vs. benign event labeling)
- Attack lifecycle analysis using MITRE ATT&CK framework mappings
- Detection rule evaluation using WitFoo's 261 lead detection rules
Quick Start
from datasets import load_dataset
# Load flat signal logs (2.07M rows, Parquet)
signals = load_dataset("witfoo/precinct6-cybersecurity", "signals", split="train")
# Find malicious events
malicious = signals.filter(lambda x: x["label_binary"] == "malicious")
# Find suspicious events (matched detection rules but not in confirmed incidents)
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
# Query by product/vendor
cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")
# Load provenance graph
nodes = load_dataset("witfoo/precinct6-cybersecurity", "graph_nodes", split="train")
edges = load_dataset("witfoo/precinct6-cybersecurity", "graph_edges", split="train")
# Load full incident graphs (10K incidents with embedded artifacts, leads, and MITRE mappings)
incidents = load_dataset("witfoo/precinct6-cybersecurity", "incidents", split="train")
SQL queries (HuggingFace dataset viewer):
-- Malicious events from confirmed incidents
SELECT * FROM signals WHERE label_binary='malicious' LIMIT 100;
-- Suspicious events that triggered detection rules
SELECT * FROM signals WHERE label_binary='suspicious' LIMIT 100;
-- Events with matched detection rules
SELECT matched_rules, set_roles, product_name FROM signals
WHERE matched_rules != '[]' LIMIT 100;
-- Count by label tier
SELECT label_binary, COUNT(*) FROM signals GROUP BY label_binary;
Dataset Configurations
signals β Flat Security Signal Logs
Tabular format ideal for ML classification, anomaly detection, and feature engineering. Each row is a sanitized security event from production network monitoring.
| Column | Type | Description |
|---|---|---|
timestamp |
float | Unix epoch timestamp of the event |
message_type |
string | Event classification (e.g., firewall_action, account_logon, security_audit_event, dns_event, AWS API names) |
stream_name |
string | Source product/data stream identifier (see Source Products) |
pipeline |
string | Ingestion pipeline (syslog, aws_cloudtrail, etc.) |
src_ip |
string | Source IP address (sanitized) |
dst_ip |
string | Destination IP address (sanitized) |
src_port |
string | Source port |
dst_port |
string | Destination port |
protocol |
string | Network protocol (6=TCP, 17=UDP, 1=ICMP, etc.) |
src_host |
string | Source hostname (sanitized) |
dst_host |
string | Destination hostname (sanitized) |
username |
string | Associated username (sanitized) |
action |
string | Event action (block, Logon, Logoff, File System, etc.) |
severity |
string | Severity level (warning, informational, Info, etc.) |
vendor_code |
string | Vendor-specific event code (e.g., ASA-4-106023 for Cisco) |
message_sanitized |
string | Full sanitized raw log message (syslog, XML, JSON, CSV depending on source) |
label_binary |
string | malicious, suspicious, or benign (see Labeling) |
label_confidence |
float | Confidence score for the label (0.0β1.0) |
attack_techniques |
string | JSON array of MITRE ATT&CK technique IDs |
attack_tactics |
string | JSON array of MITRE ATT&CK tactic names |
mo_name |
string | Modus operandi / attack campaign type (e.g., Data Theft, Phishing) |
suspicion_score |
float | WitFoo-computed suspicion score (0.0β1.0) |
lifecycle_stage |
string | Kill chain stage (e.g., initial-compromise, complete-mission) |
matched_rules |
string | JSON array of WitFoo lead rule descriptions that matched this event |
set_roles |
string | JSON array of WitFoo classification set roles (e.g., Exploiting Host, C2 Server) |
product_name |
string | Security product that generated this event (e.g., ASA Firewall, Falcon) |
vendor_name |
string | Vendor of the security product (e.g., Cisco, Crowdstrike) |
graph_nodes β Provenance Graph Nodes
Nodes in the provenance graph representing network entities observed in security monitoring.
| Field | Type | Description |
|---|---|---|
node_id |
string | Unique node identifier (sanitized IP, hostname, or UUID) |
type |
string | Entity type: HOST, CREDENTIAL, SERVICE, FILE, CRED, ACTOR |
attrs |
object | Node attributes: ip (sanitized), hostname (sanitized), credential (sanitized) |
graph_edges β Provenance Graph Edges
Directed edges representing security events and relationships between entities.
| Field | Type | Description |
|---|---|---|
edge_id |
string | Unique edge identifier |
src |
string | Source node ID |
dst |
string | Destination node ID |
type |
string | Edge type: NETWORK_FLOW, AUDIT_EVENT, DNS_RESOLVE, INCIDENT_LINK, EVENT |
timestamp |
float | Unix epoch timestamp |
attrs |
object | Edge attributes: message_type, action, protocol, src_port, dst_port, stream |
labels |
object | Labels: label_binary, label_confidence, suspicion_score, attack_techniques, attack_tactics, mo_name, lifecycle_stage |
incidents β Full Incident Graphs
Complete incident records as produced by WitFoo Precinct's threat detection engine. Each incident is a self-contained provenance graph capturing a correlated chain of suspicious or malicious activity. This is the richest configuration β each record contains embedded nodes, edges, leads (the triggering artifacts with full raw messages), and framework mappings.
Top-level fields:
| Field | Type | Description |
|---|---|---|
id |
string | Unique incident identifier |
name |
string | Auto-generated incident name (e.g., "Convoluted Bandicoot 241304") |
mo_id |
int | Modus operandi ID |
mo_name |
string | Attack campaign type: Data Theft, Phishing |
suspicion_score |
float | WitFoo-computed suspicion score (0.0β1.0) |
status_id |
int | Incident status code |
status_name |
string | Status: Unprocessed, Investigating, Disrupted, Dismissed, False Positive |
first_observed_at |
int | Unix timestamp of earliest event in the incident |
last_observed_at |
int | Unix timestamp of latest event in the incident |
created_at |
int | Unix timestamp when the incident was created |
lead_count |
int | Number of triggering signals (leads) |
nodes |
object | Dict of entity nodes in the incident graph |
edges |
object | Dict of connections between nodes |
leads |
object | Dict of triggering artifacts with full event data |
products |
object | Security products involved in detection |
tools |
object | Security tools that generated the signals |
sets |
list | WitFoo classification sets (Exploiting Host, Exploiting Target, etc.) |
actors |
list | Threat actor attributions (if any) |
Incident leads (leads.{uuid}):
| Field | Type | Description |
|---|---|---|
id |
string | Lead UUID |
artifact |
object | Full artifact record (85+ fields) β the triggering security event |
details |
string | Sanitized raw log message that triggered the lead |
description |
string | Human-readable lead description |
set_id |
int | Classification set (1=Exploiting Host, 5=Exploiting Target, etc.) |
node_id |
string | Associated node UUID |
product |
object | Product that generated this lead, with framework mappings |
observed_at |
int | Unix timestamp of observation |
Additional Files
graph/graph.graphmlβ Full provenance graph in GraphML format for NetworkX, Gephi, or graph databasesgraph/graph.jsonβ NetworkX node-link JSON formatreference/lead_rules_catalog.jsonβ Complete catalog of 261 WitFoo lead detection rules, 158 security products, 106 classification sets, and 216 stream-to-product mappings
Data Provenance
Production Origin
This dataset was generated from production security operations data collected by WitFoo Precinct 6.x, a Security Orchestration, Automation, and Response (SOAR) platform. The data originates from real enterprise networks monitored by WitFoo's SOC platform, covering 5 organizations across diverse industry sectors.
Data collection period: JulyβAugust 2024
Processing pipeline:
- Security events were ingested by WitFoo Precinct 6.x from production network monitoring tools via syslog, API connectors, and agent-based collection
- Events were parsed by WitFoo's signal processing pipeline using field extractors specific to each product/vendor
- Events were correlated into incidents by WitFoo's automated threat detection and incident analysis engine using 261 lead detection rules
- Incidents were scored with WitFoo's suspicion scoring algorithm and mapped to security frameworks (MITRE ATT&CK, D3FEND, NIST, CIS, PCI, etc.)
- Raw signal data and incident graphs were extracted from WitFoo's Cassandra database
- All data was sanitized through a comprehensive 4-layer PII removal pipeline (see Sanitization)
- Labels were derived from WitFoo's incident analysis and lead rule matching (see Labeling)
Source Products (Stream Names)
The dataset contains security events from 158 security products across 70+ vendors, reflecting real enterprise SOC deployments. The complete product catalog is included in reference/lead_rules_catalog.json.
Key products by category:
| Category | Products |
|---|---|
| Firewalls | Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda CloudGen, Juniper SRX, OPNsense, VyOS |
| Endpoint Protection | CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance Protect, SentinelOne, Deep Instinct, Malwarebytes, ESET, Sophos Central, McAfee Endpoint |
| Network Detection | Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito, Cisco WSA |
| Identity & Access | Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo (Cisco), Okta, Shibboleth, Beyond Trust, Thycotic Secret Server |
| Cloud Security | AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler NSS, Netskope, Cisco Umbrella |
| Email Security | ProofPoint Protect, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, SpamTitan, Checkpoint Harmony Email |
| Threat Intelligence | FireEye NX/HX/AX/CMS, Trend Micro Deep Security, QRadar, Microsoft ATA, Cortex XDR |
| Data Protection | Symantec DLP, Varonis DatAdvantage, Imperva SecureSphere |
| SOAR/SIEM | WitFoo Precinct, Splunk, QRadar, Security Onion |
| Infrastructure | VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd, fail2ban), Apache, HAProxy |
Stream names in the dataset (top streams by volume):
| Stream Name | Product | Vendor | Description |
|---|---|---|---|
microsoft-windows-security-auditing |
Windows Active Directory | Microsoft | Logon/logoff, file access, privilege use, account management |
aws_cloudtrail_events |
AWS CloudTrail | Amazon Web Services | API calls: AssumeRole, Describe*, List*, Get*, 50+ event types |
aws_cloud_trail |
AWS CloudTrail | Amazon Web Services | CloudTrail via CloudWatch Logs |
vcenter |
VMware vCenter | VMware | Virtual infrastructure management events |
cisco_asa |
ASA Firewall | Cisco | Firewall allow/deny, connection teardown, VPN events |
cisco_os |
Cisco NOS | Cisco | Network device management and routing events |
cisco_stealthwatch |
Stealthwatch | Cisco | Network flow analytics and anomaly detection |
aws_vpc_flow_log |
AWS VPC Security | Amazon Web Services | Network flow data within AWS VPCs |
pan_firewall |
PAN NGFW | Palo Alto | Traffic allow/drop, threat events, URL filtering |
symantec_sep |
Symantec EP | Symantec | Endpoint security events |
meraki |
Meraki | Cisco | Cloud-managed network security events |
ad_audit_plus |
ADManager | ManageEngine | Active Directory audit and change tracking |
ad fs auditing |
Windows AD FS | Microsoft | Authentication and federation events |
network_communication |
Network Flow Data | Various | TCP/UDP/ICMP communication events |
sshd |
SSHD | Linux | SSH authentication and session events |
pam |
Linux PAM | Linux | Pluggable Authentication Module events |
crond |
cron | Linux | Scheduled task execution events |
linux_audit |
auditd | Linux | Linux kernel audit events |
dnsmasq |
dnsmasq | Linux | DNS resolver events |
barracuda_waf |
Barracuda WAF | Barracuda | Web application firewall events |
filebeat_diagnostic |
Filebeat | Elastic | Log shipper diagnostic events |
Crowdstrike Detection |
Falcon | CrowdStrike | Endpoint detection events |
DUO |
Duo | Cisco | Multi-factor authentication events |
proofpoint_protect |
Protect | ProofPoint | Email security events |
WitFoo Precinct 6.x
WitFoo Precinct is a SOAR (Security Orchestration, Automation, and Response) platform that ingests security telemetry from diverse sources, parses events using vendor-specific field extractors, correlates events into incidents using automated threat detection rules, and maps findings to security frameworks.
- Signal Processing: Multi-stage pipeline with field extraction, normalization, and enrichment
- Lead Detection Rules: 261 rules that define what makes a security event suspicious enough to create an incident lead. Rules match on stream name, message type, action, severity, and vendor-specific event codes. Each rule assigns classification sets that define the role of source and target entities (e.g., Exploiting Host β Exploiting Target)
- Incident Correlation: Automated grouping of related signals into incident graphs with nodes (hosts, credentials, actors) and edges (connections, communications)
- Framework Mapping: Events and incidents are mapped to MITRE ATT&CK, MITRE D3FEND, NIST 800-53, NIST CSF, CIS Controls, PCI DSS, ISO 27001, SOC 2, and CMMC frameworks
- Suspicion Scoring: Proprietary scoring algorithm that assigns suspicion levels to nodes and incidents based on observed behavior patterns
WitFoo Classification Sets
WitFoo classifies entities in incidents using 106 classification sets that define the role each entity plays in an attack. These are exposed in the set_roles column and in incident node data:
| Set ID | Name | Description |
|---|---|---|
| 1 | Exploiting Host | Source of attack traffic |
| 2 | Staging Host | Host used for staging payloads or tools |
| 3 | Exfiltration Host | Source of data exfiltration |
| 4 | Suspicious User | User account involved in suspicious activity |
| 5 | Exploiting Target | Target of attack traffic |
| 6 | Staging Target | Target receiving staged payloads |
| 7 | Exfiltration Target | Destination of exfiltrated data |
| 8 | C2 Server | Command & Control infrastructure |
| 9 | Bot | Compromised host acting as bot |
| 10 | Malicious File | File identified as malicious |
| 11 | Reconnaissance Host | Source of scanning/recon activity |
| 12 | Reconnaissance Target | Target of scanning/recon |
| 13 | Disruption Host | Source of disruptive activity |
| 15 | Phishing Site | Phishing infrastructure |
| 16 | Phished User | User targeted by phishing |
| 18 | Ransomware Malware | Ransomware payload |
| 19 | Ransomware Target | Target of ransomware |
| 21 | Policy Violation User | User violating security policy |
Labeling Methodology
Three-Tier Labels (malicious / suspicious / benign)
Labels are derived from two sources: WitFoo Precinct's incident analysis and lead detection rule matching.
malicious: The event was embedded as a lead (triggering artifact) inside one or more confirmed incidents. These events were identified by WitFoo's detection engine as part of attack patterns, correlated with other suspicious signals, and assigned to an incident with a suspicion score and modus operandi. The full artifact data, including raw messages, is extracted directly from the incident lead objects.suspicious: The event matched one or more of WitFoo's 261 lead detection rules (e.g., "ASA Deny", "Windows Failed Login Attempt", "Blocked Action", "CrowdStrike Detection") but did not appear in a confirmed incident. These events represent security-relevant activity flagged by detection logic.benign: The event did not match any lead detection rules and does not appear in any incident.
Label Distribution
2M Dataset (witfoo/precinct6-cybersecurity):
| Label | Count | Percentage |
|---|---|---|
benign |
1,899,723 | 91.7% |
malicious |
125,780 | 6.1% |
suspicious |
45,420 | 2.2% |
114M Dataset (witfoo/precinct6-cybersecurity-100m):
| Label | Count | Percentage |
|---|---|---|
benign |
113,326,050 | 99.34% |
malicious |
125,780 | 0.11% |
suspicious |
622,700 | 0.55% |
The imbalanced distribution reflects the reality of production SOC environments where the vast majority of events are benign, consistent with published IDS datasets (DARPA TC, LANL).
Lead Detection Rules
The matched_rules column contains JSON arrays of rule descriptions matched for each event. The complete rule catalog is in reference/lead_rules_catalog.json. Example rules:
| Rule | Criteria | Source Role | Target Role |
|---|---|---|---|
| Blocked Action | Any firewall block event | Exploiting Host | Exploiting Target |
| ASA Deny | cisco_asa + action="deny" |
Exploiting Host | Exploiting Target |
| Windows Failed Login Attempt | Windows Event ID 4625 | Exploiting Target | Exploiting Host |
| CrowdStrike Detection | Crowdstrike Detection stream |
Exploiting Target | Exploiting Host |
| AWS VPC Reject | aws_vpc_flow_log + action="REJECT" |
Exploiting Host | Exploiting Target |
| Palo Alto FW Alarm | pan_firewall + severity < 5 |
Exploiting Host | Exploiting Target |
| Authentication Failure | messageType="auth_failure" | Exploiting Host | Exploiting Target |
| The audit log was cleared | Windows Event ID 1102 | Exploiting Target | Exploiting Host |
| User Account Created | Windows Event ID 4720 | Exploiting Target | Exploiting Host |
| Special privileges assigned | Windows Event ID 4672 | Exploiting Target | Exploiting Host |
MITRE ATT&CK Mappings
Attack technique and tactic labels are derived from WitFoo's framework mapping of incident patterns. The lifecycle_stage field maps events to the APT kill chain:
initial-compromiseβ Initial access to the networkestablish-footholdβ Execution and establishing persistenceescalate-privilegeβ Privilege escalation attemptsinternal-reconnaissanceβ Discovery and internal scanningmove-laterallyβ Lateral movement between hostsmaintain-persistenceβ Command & control and persistencecomplete-missionβ Data theft, exfiltration, or impactpolicy-violationβ Policy violations (non-attack)
Incident Modus Operandi
| MO Name | Incidents | Description |
|---|---|---|
| Data Theft | 10,441 | Coordinated data exfiltration campaigns |
| Phishing | 1 | Phishing-based initial access |
Sanitization Methodology
All customer-identifying information has been removed through a comprehensive, iterative multi-layer sanitization pipeline. Quality was prioritized over processing speed β the dataset underwent multiple full re-sanitization cycles until convergence (near-zero new PII discoveries per cycle).
Pipeline Architecture
The sanitization pipeline operates in 4 layers, applied iteratively. Each cycle processes all records, and the pipeline repeats until Layers 3 and 4 find no (or near-zero) additional PII. A persistent PII Registry (SQLite-backed) maintains a global mapping of every original value to its sanitized replacement. The same original value always maps to the same token, preserving graph topology, network relationships, and host behavior patterns across all records.
Product identifier protection: Stream names, message types, pipeline names, and other product metadata fields are explicitly protected from the Aho-Corasick sweep to prevent over-sanitization of security-relevant identifiers.
A self-referencing token guard prevents the pipeline from registering its own replacement tokens (e.g., HOST-0001, ORG-1234) as new PII entries, which would otherwise cause runaway registry inflation during iterative cycles.
Layer 1: Structured Field Sanitization + Aho-Corasick Sweep
Structured field matching: Known JSON fields are sanitized based on their semantic meaning using deterministic regex and format-aware type inference:
- IP addresses β Private IPs remapped deterministically within RFC 1918 ranges using HMAC-based subnet-preserving mapping; public IPs replaced with RFC 5737 TEST-NET addresses (192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24)
- Organization names β
ORG-NNNN - Hostnames β
HOST-NNNNorhost-NNNN.example.internal - FQDNs β
host-NNNN.example.internal(public domains like google.com, microsoft.com are preserved via allowlist) - Usernames β
USER-NNNN(system accounts likeSYSTEM,LOCAL SERVICE,NETWORK SERVICE,root,sshdare preserved) - Emails β
user-NNNN@example.net - Domains β
domain-NNNN.example.net - Windows SIDs β
S-1-5-21-1000000000-2000000000-3000000000-NNNN(well-known SIDs preserved) - AWS Account IDs β Sequential 12-digit replacements
- ARNs β
arn:aws:iam::NNNN:sanitized/NNNN - Credentials / API keys β
CRED-NNNN - Machine accounts β
MACHINE-NNNN$
Field-agnostic deep scanning: All unknown JSON fields are inspected recursively using type heuristics to catch PII in fields not covered by structured parsers.
Aho-Corasick multi-pattern sweep: After field-level sanitization, the full serialized record is swept using an Aho-Corasick automaton built from all registry entries β₯4 characters (~166,000 patterns). Product identifiers (stream names, message types, pipeline names, severity codes, etc.) are protected from the sweep.
Layer 2: Format-Specific Message Parsing
Raw log messages are parsed using 8 format-specific parsers:
- Cisco ASA syslog β
src IFACE:IP/PORT dst IFACE:IP/PORTpatterns - Windows Security Event XML β DOM parsing of
TargetUserName,IpAddress,WorkstationName,SubjectDomainName,MemberSid, etc. - WinLogBeat JSON β Recursive parsing of nested structures including
agent.name,host.hostname,winlog.event_data.*,organization - AWS CloudTrail β
userIdentity,sourceIPAddress,userName,accessKeyId, recursiverequestParameters/responseElements - Palo Alto Networks CSV β BSD syslog header + CSV field parsing
- VMware ESXi β BSD syslog header hostname and IP extraction
- DNS events β IP sanitization with public domain allowlist (~1,000 domains)
- Generic fallback β Comprehensive regex battery for all unrecognized formats
Layer 3: ML/NER Residual Detection
Machine learning models scan a stratified random sample of sanitized records:
- Microsoft Presidio with spaCy
en_core_web_lgβ Entity recognition for PERSON, ORGANIZATION, IP_ADDRESS, EMAIL_ADDRESS - HuggingFace BERT NER (
dslim/bert-base-NER) β Transformer-based PER, ORG, LOC detection
Layer 4: Claude AI Contextual Review
A stratified sample is submitted to Anthropic's Claude API for contextual PII review, catching organization names, internal hostnames, employee names in file paths, AD group names, geographic identifiers, and database instance names.
Iterative Convergence
The 4-layer pipeline runs in iterative cycles until Layer 3 and Layer 4 find near-zero new entries. PII discovered by ML/AI in one cycle is caught by regex/Aho-Corasick in all subsequent cycles across the full dataset.
Sanitization Registry Statistics
The final PII registry contains ~302,000 unique mappings across 14 categories:
| PII Category | Entries | Replacement Pattern |
|---|---|---|
| Public IPs | 88,917 | RFC 5737 TEST-NET (deterministic) |
| ARNs | 43,838 | arn:aws:iam::NNNN:sanitized/NNNN |
| AWS Account IDs | 31,460 | Sequential 12-digit IDs |
| Hostnames | 30,374 | HOST-NNNN |
| Private IPs | 24,509 | HMAC-remapped RFC 1918 (subnet-preserving) |
| Credentials | 23,859 | CRED-NNNN |
| Usernames | 23,188 | USER-NNNN |
| FQDNs | 17,234 | host-NNNN.example.internal |
| Organizations | 11,013 | ORG-NNNN |
| Emails | 3,723 | user-NNNN@example.net |
| Windows SIDs | 2,019 | Standardized replacement SIDs |
| Machine Accounts | 1,406 | MACHINE-NNNN$ |
| Domains | 23 | domain-NNNN.example.net |
| Org IDs | 6 | Numeric replacement IDs |
What Is Preserved
- Timestamps β Event timing, dwell time, and lateral movement sequences
- Port numbers β Protocol behavior signals
- Protocol types β TCP/UDP/ICMP classification
- Severity levels β Event priority and criticality
- Vendor event codes β Cisco ASA codes, Windows Event IDs, AWS API names
- Action types β Block, permit, logon, logoff, file access
- MITRE ATT&CK / D3FEND mappings β Framework technique and tactic IDs
- Graph topology β Node relationships and connection patterns (via consistent IP/hostname replacement)
- Product/stream identifiers β Which security tool generated the event (explicitly protected from sanitization)
- Lead rule match results β Which detection rules matched each event
Intended Uses
Primary Use Cases
- Provenance graph-based intrusion detection research β Evaluate and benchmark graph-based IDS approaches (KnowHow, NodLink) on production-derived data
- AI cyber defense simulation β Train and evaluate reinforcement learning defense policies in CybORG and similar simulators
- Security alert classification β Build and evaluate ML models for three-tier (malicious/suspicious/benign) event classification
- Attack lifecycle analysis β Study attack progression patterns mapped to MITRE ATT&CK
- Detection rule evaluation β Analyze effectiveness of 261 lead detection rules across diverse security products
Research Context
This dataset was produced in collaboration with the University of Canterbury (New Zealand) Computer Science and Software Engineering department for two research projects:
- AI Cyber-Security Battle Simulator β Improving CybORG with realistic IDS observations, graph-based defense policies, and AI-driven attacker modeling
- Intrusion Detection based on Provenance Graphs β Evaluating reproducibility and generalizability of KnowHow and NodLink detection methods
Limitations
- Label imbalance: Production SOC data is inherently imbalanced (~92β99% benign). Sampling strategies may be needed for balanced training.
- Temporal scope: Data covers JulyβAugust 2024, a limited time window
- Organization diversity: Data from 5 organizations, each with different security tool deployments
- Sanitization trade-offs: Some log message detail is reduced by PII replacement, particularly in free-text fields
- Label derivation: Labels depend on WitFoo's automated detection and 261 rules; some attacks may be unlabeled (false negatives) and some benign events may be incorrectly flagged
- Incident coverage: The same 10,442 incidents appear in both the 2M and 114M datasets since incidents are stored separately from signal data
Ethical Considerations
- All customer-identifying information has been removed through the 4-layer sanitization process with ~302,000 PII mappings
- The dataset does not contain personally identifiable information (PII) of any individual
- IP addresses, hostnames, usernames, and organization names have been replaced with consistent synthetic tokens
- The dataset should be used for defensive security research only
Citation
@dataset{witfoo_precinct6_2025,
title={WitFoo Precinct6 Cybersecurity Dataset: Labeled Provenance Graphs and Signal Logs from Production SOC Operations},
author={WitFoo, Inc.},
year={2025},
url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity},
license={Apache-2.0}
}
License
This dataset is released under the Apache License 2.0.
- Downloads last month
- 76