input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Aug 26 09:40:41 DC1-PA3220-1 1,2023/08/26 09:40:40,016201032964,TRAFFIC,drop,2562,2023/08/26 09:40:40,222.65.22.166,87.243.200.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:40:40,0,1,57724,33502,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:40:39,0,any,,7263933889922761741,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:40:41.027-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 57724
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 26 09:40:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 33502
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 222.65.22.166
serverIP: 87.243.200.180
|
Explain this syslog message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,190.10.182.87,207.122.199.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43502,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 26 09:06:34",
"message": "<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,190.10.182.87,207.122.199.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 768,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "190.10.182.87",
"serverIP": "207.122.199.62"
}
|
Create a JSON artifact from the message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,190.10.182.87,207.122.199.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,190.10.182.87,207.122.199.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43502
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 26 09:06:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 768
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 190.10.182.87
serverIP: 207.122.199.62
|
Explain this syslog message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,200.26.106.96,167.214.115.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43502,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 26 09:06:34",
"message": "<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,200.26.106.96,167.214.115.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 768,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "200.26.106.96",
"serverIP": "167.214.115.151"
}
|
Create a JSON artifact from the message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,200.26.106.96,167.214.115.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 26 09:06:34 DC1-PA3220-1 1,2023/08/26 09:06:33,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:33,200.26.106.96,167.214.115.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:33,0,1,43502,768,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:32,0,any,,7263933889922576542,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:34.322-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43502
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 26 09:06:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 768
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 200.26.106.96
serverIP: 167.214.115.151
|
Explain this syslog message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,251.66.206.37,55.123.193.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43409,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 26 09:06:10",
"message": "<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,251.66.206.37,55.123.193.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27753,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "251.66.206.37",
"serverIP": "55.123.193.158"
}
|
Create a JSON artifact from the message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,251.66.206.37,55.123.193.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,251.66.206.37,55.123.193.158,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43409
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 26 09:06:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27753
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 251.66.206.37
serverIP: 55.123.193.158
|
Explain this syslog message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,50.175.184.74,111.143.118.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43409,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 26 09:06:10",
"message": "<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,50.175.184.74,111.143.118.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27753,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "50.175.184.74",
"serverIP": "111.143.118.236"
}
|
Create a JSON artifact from the message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,50.175.184.74,111.143.118.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 26 09:06:10 DC1-PA3220-1 1,2023/08/26 09:06:09,016201032964,TRAFFIC,drop,2562,2023/08/26 09:06:09,50.175.184.74,111.143.118.236,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/26 09:06:09,0,1,43409,27753,0,0,0x0,tcp,deny,60,60,0,1,2023/08/26 09:06:09,0,any,,7263933889922574450,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-26T09:06:10.312-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43409
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 26 09:06:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27753
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 50.175.184.74
serverIP: 111.143.118.236
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=109.73.183.75 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"109.73.183.75","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"109.73.183.75","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"charlie@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"charlie"}} ::: clientIP=109.73.183.75 ::: userName=charlie ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676515871",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "99.42.75.116",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "770-286-3108",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=109.73.183.75 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"109.73.183.75\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"109.73.183.75\",\"key\":\"DPC5KXDE2L9H5PE63K8U\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-286-3108\"},\"email\":\"charlie@oscorputilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-16T02:51:11.414150+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676515871,\"txid\":\"da5425f3-3a13-4a5c-84b5-4d8f877f0569\",\"user\":{\"groups\":[],\"key\":\"DUASF7WGY8HNZ128J3LI\",\"name\":\"charlie\"}} ::: clientIP=109.73.183.75 ::: userName=charlie ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "109.73.183.75",
"userName": "charlie"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=109.73.183.75 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"109.73.183.75","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"109.73.183.75","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"charlie@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"charlie"}} ::: clientIP=109.73.183.75 ::: userName=charlie ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=109.73.183.75 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"109.73.183.75","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"109.73.183.75","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"charlie@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"charlie"}} ::: clientIP=109.73.183.75 ::: userName=charlie ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676515871
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 99.42.75.116
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 770-286-3108
streamName: DUO
clientIP: 109.73.183.75
userName: charlie
|
Explain this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=29.80.97.63 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"29.80.97.63","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"29.80.97.63","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"janedoe@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"janedoe"}} ::: clientIP=29.80.97.63 ::: userName=janedoe ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1676515871",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "99.42.75.116",
"sensitivity": "normal",
"application": "LastPass",
"messagetype": "credential_access",
"clienthostname": "770-286-3108",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=29.80.97.63 ::: message={\"access_device\":{\"epkey\":null,\"hostname\":null,\"ip\":\"29.80.97.63\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"29.80.97.63\",\"key\":\"DPC5KXDE2L9H5PE63K8U\",\"location\":{\"city\":\"Woodstock\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-286-3108\"},\"email\":\"janedoe@oscorputilities.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2023-02-16T02:51:11.414150+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1676515871,\"txid\":\"da5425f3-3a13-4a5c-84b5-4d8f877f0569\",\"user\":{\"groups\":[],\"key\":\"DUASF7WGY8HNZ128J3LI\",\"name\":\"janedoe\"}} ::: clientIP=29.80.97.63 ::: userName=janedoe ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "29.80.97.63",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=29.80.97.63 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"29.80.97.63","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"29.80.97.63","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"janedoe@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"janedoe"}} ::: clientIP=29.80.97.63 ::: userName=janedoe ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
Product: DUO
Vendor: DUO
|
Identify this syslog message
|
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=29.80.97.63 ::: message={"access_device":{"epkey":null,"hostname":null,"ip":"29.80.97.63","location":{"city":"Woodstock","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"29.80.97.63","key":"DPC5KXDE2L9H5PE63K8U","location":{"city":"Woodstock","country":"United States","state":"Georgia"},"name":"770-286-3108"},"email":"janedoe@oscorputilities.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2023-02-16T02:51:11.414150+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1676515871,"txid":"da5425f3-3a13-4a5c-84b5-4d8f877f0569","user":{"groups":[],"key":"DUASF7WGY8HNZ128J3LI","name":"janedoe"}} ::: clientIP=29.80.97.63 ::: userName=janedoe ::: created_at=1676515871 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1676515871 ::: clientHostname=770-286-3108 ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 1676515871
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 99.42.75.116
sensitivity: normal
application: LastPass
messagetype: credential_access
clienthostname: 770-286-3108
streamName: DUO
clientIP: 29.80.97.63
userName: janedoe
|
Explain this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=223.105.217.46 dst=105.251.163.223 protocol=tcp sport=56830 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=223.105.217.46 dst=105.251.163.223 protocol=tcp sport=56830 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56830,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "223.105.217.46",
"serverIP": "105.251.163.223"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=223.105.217.46 dst=105.251.163.223 protocol=tcp sport=56830 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=223.105.217.46 dst=105.251.163.223 protocol=tcp sport=56830 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56830
protocol: 6
streamName: meraki_l7_firewall
clientIP: 223.105.217.46
serverIP: 105.251.163.223
|
Explain this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=197.165.198.208 dst=0.187.78.61 protocol=tcp sport=56830 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=197.165.198.208 dst=0.187.78.61 protocol=tcp sport=56830 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56830,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "197.165.198.208",
"serverIP": "0.187.78.61"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=197.165.198.208 dst=0.187.78.61 protocol=tcp sport=56830 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=197.165.198.208 dst=0.187.78.61 protocol=tcp sport=56830 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56830
protocol: 6
streamName: meraki_l7_firewall
clientIP: 197.165.198.208
serverIP: 0.187.78.61
|
Explain this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.107.33.153 dst=184.143.228.123 protocol=tcp sport=56830 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.107.33.153 dst=184.143.228.123 protocol=tcp sport=56830 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56830,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "250.107.33.153",
"serverIP": "184.143.228.123"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.107.33.153 dst=184.143.228.123 protocol=tcp sport=56830 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.107.33.153 dst=184.143.228.123 protocol=tcp sport=56830 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56830
protocol: 6
streamName: meraki_l7_firewall
clientIP: 250.107.33.153
serverIP: 184.143.228.123
|
Explain this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.201.235.155 dst=168.34.120.209 protocol=tcp sport=56830 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.201.235.155 dst=168.34.120.209 protocol=tcp sport=56830 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56830,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "250.201.235.155",
"serverIP": "168.34.120.209"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.201.235.155 dst=168.34.120.209 protocol=tcp sport=56830 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.75.11.141 1 1659650862.454444542 M162_MX67C_SavCCG l7_firewall src=250.201.235.155 dst=168.34.120.209 protocol=tcp sport=56830 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56830
protocol: 6
streamName: meraki_l7_firewall
clientIP: 250.201.235.155
serverIP: 168.34.120.209
|
Explain this syslog message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,176.135.84.69,73.211.243.109,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 64506,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:46",
"message": "<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,176.135.84.69,73.211.243.109,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 48331,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "73.211.243.109",
"serverIP": "176.135.84.69"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,176.135.84.69,73.211.243.109,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,176.135.84.69,73.211.243.109,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 64506
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:46
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 48331
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 73.211.243.109
serverIP: 176.135.84.69
|
Explain this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,57.126.110.124,29.62.94.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,52869,10365,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686571,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52869,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:14",
"message": "<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,57.126.110.124,29.62.94.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,52869,10365,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686571,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10365,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "57.126.110.124",
"serverIP": "29.62.94.73"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,57.126.110.124,29.62.94.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,52869,10365,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686571,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,57.126.110.124,29.62.94.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,52869,10365,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686571,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52869
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10365
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 57.126.110.124
serverIP: 29.62.94.73
|
Explain this syslog message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,214.79.68.173,145.217.199.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 64506,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:46",
"message": "<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,214.79.68.173,145.217.199.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 48331,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "145.217.199.63",
"serverIP": "214.79.68.173"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,214.79.68.173,145.217.199.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:46 DC1-PA3220-1 1,2023/12/30 14:14:46,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:46,214.79.68.173,145.217.199.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:46,0,1,48331,64506,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:43,0,any,,7299323810839688919,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:46.965-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 64506
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:46
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 48331
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 145.217.199.63
serverIP: 214.79.68.173
|
Explain this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,136.143.122.15,120.239.128.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51899,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:47",
"message": "<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,136.143.122.15,120.239.128.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18936,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "136.143.122.15",
"serverIP": "120.239.128.42"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,136.143.122.15,120.239.128.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,136.143.122.15,120.239.128.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51899
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18936
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 136.143.122.15
serverIP: 120.239.128.42
|
Explain this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,102.156.49.185,35.252.2.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51899,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:47",
"message": "<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,102.156.49.185,35.252.2.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18936,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "102.156.49.185",
"serverIP": "35.252.2.153"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,102.156.49.185,35.252.2.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,102.156.49.185,35.252.2.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51899
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18936
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 102.156.49.185
serverIP: 35.252.2.153
|
Explain this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,152.19.60.98,96.182.38.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:07",
"message": "<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,152.19.60.98,96.182.38.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4182,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "152.19.60.98",
"serverIP": "96.182.38.218"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,152.19.60.98,96.182.38.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,152.19.60.98,96.182.38.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4182
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 152.19.60.98
serverIP: 96.182.38.218
|
Explain this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,82.159.81.215,241.149.56.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:07",
"message": "<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,82.159.81.215,241.149.56.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4182,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "82.159.81.215",
"serverIP": "241.149.56.113"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,82.159.81.215,241.149.56.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,82.159.81.215,241.149.56.113,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4182
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 82.159.81.215
serverIP: 241.149.56.113
|
Explain this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,179.37.185.149,238.199.157.111,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51899,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:47",
"message": "<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,179.37.185.149,238.199.157.111,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18936,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "179.37.185.149",
"serverIP": "238.199.157.111"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,179.37.185.149,238.199.157.111,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:47 DC1-PA3220-1 1,2023/12/30 14:14:47,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:47,179.37.185.149,238.199.157.111,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:47,0,1,51899,18936,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:44,0,any,,7299323810839689006,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:47.840-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51899
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18936
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 179.37.185.149
serverIP: 238.199.157.111
|
Explain this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,216.165.187.183,15.102.73.58,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:07",
"message": "<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,216.165.187.183,15.102.73.58,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4182,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "216.165.187.183",
"serverIP": "15.102.73.58"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,216.165.187.183,15.102.73.58,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:07 DC1-PA3220-1 1,2023/12/30 14:14:06,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:06,216.165.187.183,15.102.73.58,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:06,0,1,58914,4182,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:04,0,any,,7299323810839685874,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:07.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4182
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 216.165.187.183
serverIP: 15.102.73.58
|
Explain this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,207.89.227.198,203.154.173.205,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56484,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:14",
"message": "<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,207.89.227.198,203.154.173.205,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17862,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "207.89.227.198",
"serverIP": "203.154.173.205"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,207.89.227.198,203.154.173.205,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,207.89.227.198,203.154.173.205,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56484
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17862
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 207.89.227.198
serverIP: 203.154.173.205
|
Explain this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,81.15.99.57,15.58.170.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56484,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:14:14",
"message": "<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,81.15.99.57,15.58.170.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17862,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "81.15.99.57",
"serverIP": "15.58.170.101"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,81.15.99.57,15.58.170.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:14:14 DC1-PA3220-1 1,2023/12/30 14:14:14,016201032964,TRAFFIC,drop,2562,2023/12/30 14:14:14,81.15.99.57,15.58.170.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:14:14,0,1,56484,17862,0,0,0x0,tcp,deny,60,60,0,1,2023/12/30 14:14:12,0,any,,7299323810839686573,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:14:14.907-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56484
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:14:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17862
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 81.15.99.57
serverIP: 15.58.170.101
|
Explain this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,9.41.109.104,145.120.41.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42602,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:15:06",
"message": "<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,9.41.109.104,145.120.41.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "9.41.109.104",
"serverIP": "145.120.41.198"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,9.41.109.104,145.120.41.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,9.41.109.104,145.120.41.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42602
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:15:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 9.41.109.104
serverIP: 145.120.41.198
|
Explain this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,166.228.161.182,78.29.224.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42602,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:15:06",
"message": "<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,166.228.161.182,78.29.224.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "166.228.161.182",
"serverIP": "78.29.224.180"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,166.228.161.182,78.29.224.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,166.228.161.182,78.29.224.180,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42602
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:15:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 166.228.161.182
serverIP: 78.29.224.180
|
Explain this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,155.80.21.196,108.221.212.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42602,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:15:06",
"message": "<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,155.80.21.196,108.221.212.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "155.80.21.196",
"serverIP": "108.221.212.248"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,155.80.21.196,108.221.212.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,155.80.21.196,108.221.212.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42602
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:15:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 155.80.21.196
serverIP: 108.221.212.248
|
Explain this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,121.82.70.71,246.236.247.27,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42602,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 30 14:15:06",
"message": "<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,121.82.70.71,246.236.247.27,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "121.82.70.71",
"serverIP": "246.236.247.27"
}
|
Create a JSON artifact from the message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,121.82.70.71,246.236.247.27,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 30 14:15:06 DC1-PA3220-1 1,2023/12/30 14:15:05,016201032964,TRAFFIC,drop,2562,2023/12/30 14:15:05,121.82.70.71,246.236.247.27,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/30 14:15:05,0,1,42602,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/30 14:15:04,0,any,,7299323810839690341,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-30T14:15:06.563-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42602
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 30 14:15:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 121.82.70.71
serverIP: 246.236.247.27
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=255.187.54.176 dst=187.50.38.55 protocol=tcp sport=80 dport=42472 decision=blocked
|
{
"action": "block",
"clientport": 42472,
"message": "<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=255.187.54.176 dst=187.50.38.55 protocol=tcp sport=80 dport=42472 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "187.50.38.55",
"serverIP": "255.187.54.176"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=255.187.54.176 dst=187.50.38.55 protocol=tcp sport=80 dport=42472 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=255.187.54.176 dst=187.50.38.55 protocol=tcp sport=80 dport=42472 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42472
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 187.50.38.55
serverIP: 255.187.54.176
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=45.4.153.218 dst=164.160.145.25 protocol=tcp sport=80 dport=42472 decision=blocked
|
{
"action": "block",
"clientport": 42472,
"message": "<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=45.4.153.218 dst=164.160.145.25 protocol=tcp sport=80 dport=42472 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "164.160.145.25",
"serverIP": "45.4.153.218"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=45.4.153.218 dst=164.160.145.25 protocol=tcp sport=80 dport=42472 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=45.4.153.218 dst=164.160.145.25 protocol=tcp sport=80 dport=42472 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42472
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 164.160.145.25
serverIP: 45.4.153.218
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=150.149.253.13 dst=207.102.121.123 protocol=tcp sport=80 dport=42472 decision=blocked
|
{
"action": "block",
"clientport": 42472,
"message": "<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=150.149.253.13 dst=207.102.121.123 protocol=tcp sport=80 dport=42472 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "207.102.121.123",
"serverIP": "150.149.253.13"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=150.149.253.13 dst=207.102.121.123 protocol=tcp sport=80 dport=42472 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=150.149.253.13 dst=207.102.121.123 protocol=tcp sport=80 dport=42472 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42472
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 207.102.121.123
serverIP: 150.149.253.13
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=199.163.167.117 dst=116.183.69.190 protocol=tcp sport=80 dport=42472 decision=blocked
|
{
"action": "block",
"clientport": 42472,
"message": "<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=199.163.167.117 dst=116.183.69.190 protocol=tcp sport=80 dport=42472 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "116.183.69.190",
"serverIP": "199.163.167.117"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=199.163.167.117 dst=116.183.69.190 protocol=tcp sport=80 dport=42472 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688270959.303303564 NORDC_MX400_1 l7_firewall src=199.163.167.117 dst=116.183.69.190 protocol=tcp sport=80 dport=42472 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 42472
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 116.183.69.190
serverIP: 199.163.167.117
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=248.125.100.122 dst=158.145.189.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
{
"action": "block",
"clientport": 65338,
"message": "<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=248.125.100.122 dst=158.145.189.210 protocol=tcp sport=443 dport=65338 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "158.145.189.210",
"serverIP": "248.125.100.122"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=248.125.100.122 dst=158.145.189.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=248.125.100.122 dst=158.145.189.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65338
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 158.145.189.210
serverIP: 248.125.100.122
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=112.221.33.91 dst=136.126.209.135 protocol=tcp sport=443 dport=65338 decision=blocked
|
{
"action": "block",
"clientport": 65338,
"message": "<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=112.221.33.91 dst=136.126.209.135 protocol=tcp sport=443 dport=65338 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "136.126.209.135",
"serverIP": "112.221.33.91"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=112.221.33.91 dst=136.126.209.135 protocol=tcp sport=443 dport=65338 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=112.221.33.91 dst=136.126.209.135 protocol=tcp sport=443 dport=65338 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65338
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 136.126.209.135
serverIP: 112.221.33.91
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=164.160.93.75 dst=231.69.142.23 protocol=tcp sport=443 dport=65338 decision=blocked
|
{
"action": "block",
"clientport": 65338,
"message": "<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=164.160.93.75 dst=231.69.142.23 protocol=tcp sport=443 dport=65338 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "231.69.142.23",
"serverIP": "164.160.93.75"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=164.160.93.75 dst=231.69.142.23 protocol=tcp sport=443 dport=65338 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=164.160.93.75 dst=231.69.142.23 protocol=tcp sport=443 dport=65338 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65338
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 231.69.142.23
serverIP: 164.160.93.75
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=29.100.247.97 dst=244.231.216.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
{
"action": "block",
"clientport": 65338,
"message": "<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=29.100.247.97 dst=244.231.216.210 protocol=tcp sport=443 dport=65338 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "244.231.216.210",
"serverIP": "29.100.247.97"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=29.100.247.97 dst=244.231.216.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688345660.136349747 NORDC_MX400_1 l7_firewall src=29.100.247.97 dst=244.231.216.210 protocol=tcp sport=443 dport=65338 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 65338
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 244.231.216.210
serverIP: 29.100.247.97
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.