Dataset Viewer
Auto-converted to Parquet Duplicate
timestamp
float64
1.72B
1.72B
message_type
stringclasses
211 values
stream_name
stringclasses
75 values
pipeline
stringclasses
6 values
src_ip
stringlengths
0
15
dst_ip
stringclasses
933 values
src_port
stringlengths
0
5
dst_port
stringlengths
0
5
protocol
stringclasses
7 values
src_host
stringclasses
129 values
dst_host
stringclasses
1 value
username
stringlengths
0
9
action
stringclasses
46 values
severity
stringclasses
11 values
vendor_code
stringlengths
0
17
message_sanitized
stringlengths
0
4.1k
label_binary
stringclasses
2 values
label_confidence
float32
0.5
0.6
suspicion_score
float32
0
0
mo_name
stringclasses
1 value
lifecycle_stage
stringclasses
2 values
matched_rules
stringclasses
2 values
set_roles
stringclasses
2 values
product_name
stringclasses
10 values
vendor_name
stringclasses
9 values
1,722,052,272.369439
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 03:31:36 ORG-0495: Removed session 8072854.
benign
0.5
0
none
[]
[]
1,722,052,272.369423
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:15:01 HOST-0001 ORG-0501[1767609]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,272.369407
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-250278]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,272.369392
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,272.369366
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250818]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,272.36935
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,272.369334
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,272.369316
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:05:01 HOST-0001 ORG-0501[CRED-2727437]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,272.369295
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1860 ORG-0495: Removed session 8072895.
benign
0.5
0
none
[]
[]
1,722,052,272.36927
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-30485]: finished 0anacron
benign
0.5
0
none
[]
[]
1,722,052,271.368142
systemd_event
systemd
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1859 HOST-0001 USER-0086d: Started Session 8072900 of user USER-0001.
benign
0.5
0
none
[]
[]
1,722,052,271.368127
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
3
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011CRED-24059#011[logstash]#011logstash/async.go:280#011Failed to publish HOST-56507s caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer
benign
0.5
0
none
[]
[]
1,722,052,271.368113
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-25194]: starting 0anacron
benign
0.5
0
none
[]
[]
1,722,052,271.368097
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:20:01 HOST-0001 ORG-0501[1CRED-3057658]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,271.368082
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-302110]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,271.368063
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250817]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,271.368044
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:45:01 HOST-0001 ORG-0501[19CRED-299032]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,271.36803
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 ORG-0501[173CRED-25194]: (HOST-1221) CMD (run-parts /etc/cron.hourly)
benign
0.5
0
none
[]
[]
1,722,052,271.368012
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:40:01 HOST-0001 ORG-0501[CRED-29735644]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,271.367991
pam_event
pam
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 24 03:28:10 HOST-0001 sshd[CRED-23716858]: pam_unix(sshd:session): session opened for user USER-0001 by (uid=0)
benign
0.5
0
none
[]
[]
Linux PAM
Linux
1,722,052,270.36667
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
[USER-9564-12-17T13:04:26.495Z] [ CRED-23501] [vix] VixHOST-4250_ProcessVixCommand: command 186
benign
0.5
0
none
[]
[]
1,722,052,270.36665
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:40:01 HOST-0001 ORG-0501[CRED-29735638]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,270.366631
management_message
cisco_os
streamer2_logserver_udp_514
10.171.84.129
3
<187>1994960: 10.171.84.129: Jul 26 22:50:59.547 CDT: %ORG-1774 ORG-0661ler port CRED-24059, ORG-9508 Gi1/0/6: HOST-54513 given, but ORG-1775 does not report HOST-54513 Good
benign
0.5
0
none
[]
[]
Cisco Network Operating System
Cisco
1,722,052,270.366612
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:55:01 HOST-0001 ORG-0501[1997207]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,270.366593
management_message
cisco_os
streamer2_logserver_udp_514
10.230.152.3
3
<187>32CRED-23686: HOST-0696: Jul 26 22:50:59.852 CDT: %LINK-3-UPDOWN: ORG-9508 GigabitEthernet2/0/19, changed HOST-54774 to up
benign
0.5
0
none
[]
[]
Cisco Network Operating System
Cisco
1,722,052,270.36654
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Dec 31 03:19:50 HOST-0001 filebeat: USER-9564-12-31T03:19:50.779-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,270.366515
auth_success
sshd
filebeat
10.248.113.130
59962
USER-0010-0001.domain-0022.example.net
USER-0001
5
Dec 31 03:24:44 HOST-0001 sshd[55CRED-25196]: Accepted password for USER-0001 from 10.248.113.130 port 59962 ORG-0487
benign
0.5
0
none
[]
[]
1,722,052,270.366492
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:25:01 HOST-0001 ORG-0501[1788471]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,270.36647
auth_success
sshd
filebeat
10.248.113.130
61104
USER-0010-0001.domain-0022.example.net
USER-0001
5
Jan 21 03:31:11 HOST-0001 sshd[CRED-23741364]: Accepted password for USER-0001 from 10.248.113.130 port 61104 ORG-0487
benign
0.5
0
none
[]
[]
1,722,052,270.366442
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 30 20:00:01 HOST-0001 ORG-0501[3404690]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,269.365234
access_log
sshd
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 24 03:28:11 HOST-0001 sshd[CRED-23716747]: Received disconnect from 10.248.113.130 port 5CRED-25184:11: Terminating connection
benign
0.5
0
none
[]
[]
1,722,052,269.365219
access_log
sshd
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 7 03:51:07 HOST-0001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection
benign
0.5
0
none
[]
[]
1,722,052,269.365206
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Dec 24 03:24:24 HOST-0001 filebeat: USER-9564-12-24T03:24:24.701-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,269.36519
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 21 03:36:50 ORG-0495: Removed session 8CRED-2562492.
benign
0.5
0
none
[]
[]
1,722,052,269.365165
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 13 15:10:01 HOST-0001 ORG-0501[78CRED-30336]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,269.365151
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 7 03:45:45 ORG-0495: Removed session 7CRED-334189.
benign
0.5
0
none
[]
[]
1,722,052,269.365138
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,269.365123
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1860 ORG-0495: Removed session 8072896.
benign
0.5
0
none
[]
[]
1,722,052,269.365107
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,269.365084
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
3
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011CRED-24059#011[logstash]#011logstash/async.go:280#011Failed to publish HOST-56507s caused by: USER-8159 is not connected
benign
0.5
0
none
[]
[]
1,722,052,268.364443
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1860 ORG-0495: Removed session 8072895.
benign
0.5
0
none
[]
[]
1,722,052,268.364427
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,268.364412
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,268.364397
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:20:01 HOST-0001 ORG-0501[1CRED-3057659]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,268.364383
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:53:01 HOST-0001 ORG-0501[1978565]: (HOST-1221) CMD (/usr/lib64/sa/sa2 -A)
benign
0.5
0
none
[]
[]
1,722,052,268.364366
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
3
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011CRED-24059#011[logstash]#011logstash/async.go:280#011Failed to publish HOST-56507s caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer
benign
0.5
0
none
[]
[]
1,722,052,268.364351
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:20:01 HOST-0001 ORG-0501[1CRED-3057658]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,268.364337
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 03:31:36 ORG-0495: Removed session 8072854.
benign
0.5
0
none
[]
[]
1,722,052,268.364318
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:15:01 HOST-0001 ORG-0501[1767609]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,268.364295
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-302110]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,267.363067
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-250278]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,267.363052
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250818]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,267.363035
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:05:01 HOST-0001 ORG-0501[CRED-2727437]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,267.363021
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-30485]: finished 0anacron
benign
0.5
0
none
[]
[]
1,722,052,267.363008
systemd_event
systemd
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1859 HOST-0001 USER-0086d: Started Session 8072900 of user USER-0001.
benign
0.5
0
none
[]
[]
1,722,052,267.362994
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-25194]: starting 0anacron
benign
0.5
0
none
[]
[]
1,722,052,267.362977
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250817]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,267.362959
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:45:01 HOST-0001 ORG-0501[19CRED-299032]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,267.362943
management_message
cisco_os
streamer2_logserver_udp_514
10.221.138.203
3
<187>113189: 10.221.138.203: Jul 26 22:50:59.059 CDT: %LINK-3-UPDOWN: ORG-9508 GigabitEthernet3/0/27, changed HOST-54774 to down
benign
0.5
0
none
[]
[]
Cisco Network Operating System
Cisco
1,722,052,267.362921
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 ORG-0501[173CRED-25194]: (HOST-1221) CMD (run-parts /etc/cron.hourly)
benign
0.5
0
none
[]
[]
1,722,052,266.361653
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:40:01 HOST-0001 ORG-0501[CRED-29735644]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,266.361636
pam_event
pam
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 24 03:28:10 HOST-0001 sshd[CRED-23716858]: pam_unix(sshd:session): session opened for user USER-0001 by (uid=0)
benign
0.5
0
none
[]
[]
Linux PAM
Linux
1,722,052,266.361619
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:40:01 HOST-0001 ORG-0501[CRED-29735638]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,266.361606
management_message
cisco_os
streamer2_logserver_udp_514
10.171.84.129
5
<189>1994959: 10.171.84.129: Jul 26 22:50:59.545 CDT: %ILHOST-54513-5-ORG-1846_DISCONNECT: ORG-9508 Gi1/0/6: PD removed
benign
0.5
0
none
[]
[]
Cisco Network Operating System
Cisco
1,722,052,266.361587
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:55:01 HOST-0001 ORG-0501[1997207]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,266.361566
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:25:01 HOST-0001 ORG-0501[1788471]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,266.361553
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
[USER-9564-12-17T13:04:26.495Z] [ CRED-23501] [vix] VixHOST-4250_ProcessVixCommand: command 186
benign
0.5
0
none
[]
[]
1,722,052,266.361533
auth_success
sshd
filebeat
10.248.113.130
61104
USER-0010-0001.domain-0022.example.net
USER-0001
5
Jan 21 03:31:11 HOST-0001 sshd[CRED-23741364]: Accepted password for USER-0001 from 10.248.113.130 port 61104 ORG-0487
benign
0.5
0
none
[]
[]
1,722,052,266.361517
access_log
sshd
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 24 03:28:11 HOST-0001 sshd[CRED-23716747]: Received disconnect from 10.248.113.130 port 5CRED-25184:11: Terminating connection
benign
0.5
0
none
[]
[]
1,722,052,266.361499
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 21 03:36:50 ORG-0495: Removed session 8CRED-2562492.
benign
0.5
0
none
[]
[]
1,722,052,265.361018
management_message
cisco_os
streamer2_logserver_udp_514
10.221.138.203
5
<189>113188: 10.221.138.203: Jul 26 22:50:58.049 CDT: %LINEPROTO-5-UPDOWN: Line protocol on ORG-9508 GigabitEthernet3/0/27, changed HOST-54774 to down
benign
0.5
0
none
[]
[]
Cisco Network Operating System
Cisco
1,722,052,265.360999
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 13 15:10:01 HOST-0001 ORG-0501[78CRED-30336]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,265.36098
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Dec 31 03:19:50 HOST-0001 filebeat: USER-9564-12-31T03:19:50.779-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,265.360959
auth_success
sshd
filebeat
10.248.113.130
59962
USER-0010-0001.domain-0022.example.net
USER-0001
5
Dec 31 03:24:44 HOST-0001 sshd[55CRED-25196]: Accepted password for USER-0001 from 10.248.113.130 port 59962 ORG-0487
benign
0.5
0
none
[]
[]
1,722,052,265.360941
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Dec 24 03:24:24 HOST-0001 filebeat: USER-9564-12-24T03:24:24.701-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,265.360922
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Dec 30 20:00:01 HOST-0001 ORG-0501[3404690]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,265.360903
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1860 ORG-0495: Removed session 8072896.
benign
0.5
0
none
[]
[]
1,722,052,265.360882
access_log
sshd
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 7 03:51:07 HOST-0001 sshd[43386]: Received disconnect from 10.248.113.130 port 60852:11: Terminating connection
benign
0.5
0
none
[]
[]
1,722,052,265.360863
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 7 03:45:45 ORG-0495: Removed session 7CRED-334189.
benign
0.5
0
none
[]
[]
1,722,052,265.360833
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:20:01 HOST-0001 ORG-0501[1CRED-3057658]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,264.359503
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,264.359485
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 03:31:36 ORG-0495: Removed session 8072854.
benign
0.5
0
none
[]
[]
1,722,052,264.359466
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:15:01 HOST-0001 ORG-0501[1767609]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,264.359447
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,264.359427
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-250278]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,264.359408
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
3
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.573-0600#011CRED-24059#011[logstash]#011logstash/async.go:280#011Failed to publish HOST-56507s caused by: USER-8159 is not connected
benign
0.5
0
none
[]
[]
1,722,052,264.359389
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250818]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,264.359371
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:223#011 done
benign
0.5
0
none
[]
[]
1,722,052,264.359351
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
6
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011ORG-0706#011[publisher]#011HOST-55040line/retry.go:219#011retryer: send unwait signal to consumer
benign
0.5
0
none
[]
[]
1,722,052,264.359321
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:05:01 HOST-0001 ORG-0501[CRED-2727437]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,263.35833
auth_event
systemd_logind
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1860 ORG-0495: Removed session 8072895.
benign
0.5
0
none
[]
[]
1,722,052,263.358316
systemd_event
systemd
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 14 USER-1859 HOST-0001 USER-0086d: Started Session 8072900 of user USER-0001.
benign
0.5
0
none
[]
[]
1,722,052,263.358299
diagnostic_event
filebeat_diagnostic
filebeat
USER-0010-0001.domain-0022.example.net
3
Jan 7 03:45:44 HOST-0001 filebeat: USER-9546-01-07T03:45:44.550-0600#011CRED-24059#011[logstash]#011logstash/async.go:280#011Failed to publish HOST-56507s caused by: read tcp 10.91.134.188:49020->10.251.238.34:5044: read: connection reset by peer
benign
0.5
0
none
[]
[]
1,722,052,263.358286
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-25194]: starting 0anacron
benign
0.5
0
none
[]
[]
1,722,052,263.358269
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:20:01 HOST-0001 ORG-0501[1CRED-3057659]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,263.358252
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:50:01 HOST-0001 ORG-0501[19CRED-250817]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,263.358235
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:53:01 HOST-0001 ORG-0501[1978565]: (HOST-1221) CMD (/usr/lib64/sa/sa2 -A)
benign
0.5
0
none
[]
[]
1,722,052,263.358218
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 19 23:45:01 HOST-0001 ORG-0501[19CRED-299032]: (USER-0001) CMD (if [ -f ORG-6976 ]; then ORG-6976 --monitor_HOST-4035r > /dev/null 2>&1 ; fi)
benign
0.5
0
none
[]
[]
1,722,052,263.3582
systemd_event
crond
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:10:01 HOST-0001 ORG-0501[17CRED-302110]: (HOST-1221) CMD (/usr/lib64/ORG-0532 1 1)
benign
0.5
0
none
[]
[]
1,722,052,263.358165
unknown
no_useful_info
filebeat
USER-0010-0001.domain-0022.example.net
5
Jan 6 12:01:01 HOST-0001 run-parts(/etc/cron.hourly)[173CRED-30485]: finished 0anacron
benign
0.5
0
none
[]
[]
End of preview. Expand in Data Studio

WitFoo Precinct6 Cybersecurity Dataset (114M)

Overview

A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by WitFoo Precinct version 6.x. This dataset contains 114 million sanitized security events (signal logs) and provenance graphs (10,442 incident graphs with 23,362 nodes and 32,732,650 edges) from real enterprise network monitoring across 5 organizations.

Available in two sizes:

Generate your own: WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: witfoo/dataset-from-precinct6

This dataset is designed to support research in:

  • Provenance graph-based intrusion detection (KnowHow, NodLink, and similar systems)
  • AI-driven cyber defense simulation (CybORG and MARL-based defense policy training)
  • Security alert classification (malicious vs. suspicious vs. benign event labeling)
  • Attack lifecycle analysis using MITRE ATT&CK framework mappings
  • Detection rule evaluation using WitFoo's 261 lead detection rules

Quick Start

from datasets import load_dataset

# Load flat signal logs (114M rows across 58 Parquet shards)
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")

# Find malicious events (from confirmed incidents)
malicious = signals.filter(lambda x: x["label_binary"] == "malicious")

# Find suspicious events (matched detection rules)
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")

# Query by product/vendor
cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")

# Load provenance graph
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")

# Load full incident graphs
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")

Label Distribution

Label Count Percentage
benign 113,326,050 99.34%
malicious 125,780 0.11%
suspicious 622,700 0.55%

Signal Columns

Column Type Description
timestamp float Unix epoch timestamp
message_type string Event classification (e.g., firewall_action, account_logon, AssumeRole)
stream_name string Source product/data stream (see Source Products below)
pipeline string Ingestion pipeline
src_ip string Source IP (sanitized)
dst_ip string Destination IP (sanitized)
src_port string Source port
dst_port string Destination port
protocol string Network protocol (6=TCP, 17=UDP, 1=ICMP)
src_host string Source hostname (sanitized)
dst_host string Destination hostname (sanitized)
username string Associated username (sanitized)
action string Event action (block, permit, logon, logoff)
severity string Severity level
vendor_code string Vendor-specific event code
message_sanitized string Full sanitized raw log message
label_binary string malicious, suspicious, or benign
label_confidence float Confidence score (0.0–1.0)
suspicion_score float WitFoo suspicion score (0.0–1.0)
mo_name string Modus operandi (e.g., Data Theft)
lifecycle_stage string Kill chain stage (e.g., initial-compromise, complete-mission)
matched_rules string JSON array of matched WitFoo lead rule descriptions
set_roles string JSON array of classification roles (e.g., Exploiting Host, C2 Server)
product_name string Security product name (e.g., ASA Firewall, Falcon)
vendor_name string Product vendor (e.g., Cisco, Crowdstrike)

Source Products

The dataset contains events from 158 security products across 70+ vendors. Complete catalog in reference/lead_rules_catalog.json.

Category Products
Firewalls Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda, Juniper SRX
Endpoint Protection CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance, SentinelOne, Deep Instinct, Sophos, McAfee, ESET
Network Detection Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito
Identity & Access Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo, Okta, Beyond Trust
Cloud Security AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler, Netskope, Cisco Umbrella
Email Security ProofPoint, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, Checkpoint Harmony
Threat Intelligence FireEye NX/HX/AX/CMS, Trend Micro, QRadar, Microsoft ATA, Cortex XDR
Infrastructure VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd), Apache, HAProxy

Labeling Methodology

Three-tier labels derived from two sources:

  • malicious (125,780): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
  • suspicious (622,700): Events matching WitFoo's 261 lead detection rules (e.g., "ASA Deny", "Windows Failed Login", "CrowdStrike Detection") but not in confirmed incidents.
  • benign (113,326,050): Events not matching any detection rules and not in any incident.

The matched_rules column shows which detection rules matched. The set_roles column shows WitFoo classification roles (Exploiting Host, C2 Server, Staging Target, etc.).

Lead Detection Rules

261 rules included in reference/lead_rules_catalog.json. Examples:

Rule Criteria Roles
Blocked Action Any firewall block Exploiting Host → Exploiting Target
ASA Deny cisco_asa + deny Exploiting Host → Exploiting Target
Windows Failed Login Event ID 4625 Exploiting Target → Exploiting Host
CrowdStrike Detection CrowdStrike stream Exploiting Target → Exploiting Host
AWS VPC Reject VPC flow + REJECT Exploiting Host → Exploiting Target
Authentication Failure auth_failure type Exploiting Host → Exploiting Target
Audit log cleared Event ID 1102 Exploiting Target → Exploiting Host

Sanitization

All customer-identifying information removed through a 4-layer iterative pipeline:

  1. Structured field sanitization + Aho-Corasick sweep (~166,000 patterns) with product identifier protection
  2. Format-specific message parsing (8 parsers: Cisco ASA, Windows XML, WinLogBeat, CloudTrail, PAN, VMware, DNS, generic)
  3. ML/NER residual detection (Presidio + BERT NER)
  4. Claude AI contextual review

Final PII registry: ~302,000 unique mappings (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.)

Graph Data

Component Count
Nodes 23,362
Edges 32,732,650
Incidents 10,442 (Data Theft: 10,441, Phishing: 1)

Limitations

  • Label imbalance: 99.77% benign reflects production SOC reality. Sampling strategies needed for balanced training.
  • Temporal scope: July–August 2024
  • Sanitization: ~302,000 PII registry entries used for consistent replacement across all records
  • Shared incidents: Same 10,442 incidents appear in both 2M and 114M datasets
  • Sanitization trade-offs: Some log message detail reduced by PII replacement

Citation

@dataset{witfoo_precinct6_100m_2025,
  title={WitFoo Precinct6 Cybersecurity Dataset (114M)},
  author={WitFoo, Inc.},
  year={2025},
  url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
  license={Apache-2.0}
}

License

Apache License 2.0

Downloads last month
10