input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,25.147.102.58,64.110.245.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,25.147.102.58,64.110.245.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58231
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:44:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5995
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 25.147.102.58
serverIP: 64.110.245.50
|
Explain this syslog message
|
<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,138.137.131.207,200.250.62.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58231,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:44:33",
"message": "<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,138.137.131.207,200.250.62.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5995,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "138.137.131.207",
"serverIP": "200.250.62.125"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,138.137.131.207,200.250.62.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:44:33 DC1-PA3220-1 1,2024/03/18 11:44:33,016201032964,TRAFFIC,drop,2562,2024/03/18 11:44:33,138.137.131.207,200.250.62.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:44:33,0,1,58231,5995,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:44:32,0,any,,7299323811576259799,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:44:33.385-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58231
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:44:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5995
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 138.137.131.207
serverIP: 200.250.62.125
|
Explain this syslog message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,177.181.68.198,67.43.24.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44395,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:21:31",
"message": "<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,177.181.68.198,67.43.24.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "177.181.68.198",
"serverIP": "67.43.24.241"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,177.181.68.198,67.43.24.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,177.181.68.198,67.43.24.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44395
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:21:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 177.181.68.198
serverIP: 67.43.24.241
|
Explain this syslog message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,18.35.121.214,15.73.213.54,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44395,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:21:31",
"message": "<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,18.35.121.214,15.73.213.54,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "18.35.121.214",
"serverIP": "15.73.213.54"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,18.35.121.214,15.73.213.54,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:21:31 DC1-PA3220-1 1,2024/03/18 11:21:31,016201032964,TRAFFIC,drop,2562,2024/03/18 11:21:31,18.35.121.214,15.73.213.54,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:21:31,0,1,44395,445,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:21:31,0,any,,7299323811576084537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:21:31.962-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44395
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:21:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 18.35.121.214
serverIP: 15.73.213.54
|
Explain this syslog message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,156.80.207.152,44.47.203.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 48891,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:13:21",
"message": "<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,156.80.207.152,44.47.203.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "156.80.207.152",
"serverIP": "44.47.203.71"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,156.80.207.152,44.47.203.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,156.80.207.152,44.47.203.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 48891
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:13:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 156.80.207.152
serverIP: 44.47.203.71
|
Explain this syslog message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,211.9.46.160,236.57.59.70,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 48891,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:13:21",
"message": "<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,211.9.46.160,236.57.59.70,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "211.9.46.160",
"serverIP": "236.57.59.70"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,211.9.46.160,236.57.59.70,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:13:21 DC1-PA3220-1 1,2024/03/18 11:13:21,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:21,211.9.46.160,236.57.59.70,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:13:21,0,1,48891,23,0,0,0x0,tcp,deny,74,74,0,1,2024/03/18 11:13:21,0,any,,7299323811576028338,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:21.867-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 48891
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:13:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 211.9.46.160
serverIP: 236.57.59.70
|
Explain this syslog message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,141.196.56.15,176.101.65.34,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 35290,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:13:15",
"message": "<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,141.196.56.15,176.101.65.34,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 520,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "141.196.56.15",
"serverIP": "176.101.65.34"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,141.196.56.15,176.101.65.34,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,141.196.56.15,176.101.65.34,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 35290
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:13:15
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 520
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 141.196.56.15
serverIP: 176.101.65.34
|
Explain this syslog message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,134.38.93.70,169.240.175.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 35290,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:13:15",
"message": "<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,134.38.93.70,169.240.175.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 520,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "134.38.93.70",
"serverIP": "169.240.175.179"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,134.38.93.70,169.240.175.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:13:15 DC1-PA3220-1 1,2024/03/18 11:13:15,016201032964,TRAFFIC,drop,2562,2024/03/18 11:13:15,134.38.93.70,169.240.175.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/03/18 11:13:15,0,1,35290,520,0,0,0x0,udp,deny,66,66,0,1,2024/03/18 11:13:14,0,any,,7299323811576027636,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:13:15.159-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 35290
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:13:15
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 520
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 134.38.93.70
serverIP: 169.240.175.179
|
Explain this syslog message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,71.95.246.158,242.197.40.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40078,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 17 14:24:18",
"message": "<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,71.95.246.158,242.197.40.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 39914,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "71.95.246.158",
"serverIP": "242.197.40.80"
}
|
Create a JSON artifact from the message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,71.95.246.158,242.197.40.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,71.95.246.158,242.197.40.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40078
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 17 14:24:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 39914
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 71.95.246.158
serverIP: 242.197.40.80
|
Explain this syslog message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,68.213.33.122,221.68.114.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40078,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 17 14:24:18",
"message": "<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,68.213.33.122,221.68.114.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 39914,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "68.213.33.122",
"serverIP": "221.68.114.66"
}
|
Create a JSON artifact from the message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,68.213.33.122,221.68.114.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 17 14:24:18 DC1-PA3220-1 1,2024/03/17 14:24:17,016201032964,TRAFFIC,drop,2562,2024/03/17 14:24:17,68.213.33.122,221.68.114.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/17 14:24:17,0,1,40078,39914,0,0,0x0,tcp,deny,60,60,0,1,2024/03/17 14:24:14,0,any,,7299323811568007288,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-17T14:24:18.648-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40078
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 17 14:24:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 39914
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 68.213.33.122
serverIP: 221.68.114.66
|
Explain this syslog message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,89.54.127.135,77.22.126.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:27:02",
"message": "<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,89.54.127.135,77.22.126.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 70,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "89.54.127.135",
"serverIP": "77.22.126.7"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,89.54.127.135,77.22.126.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,89.54.127.135,77.22.126.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:27:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 70
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 89.54.127.135
serverIP: 77.22.126.7
|
Explain this syslog message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,218.227.63.84,138.188.111.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:27:02",
"message": "<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,218.227.63.84,138.188.111.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 70,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "218.227.63.84",
"serverIP": "138.188.111.69"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,218.227.63.84,138.188.111.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:27:02 DC1-PA3220-1 1,2024/03/18 11:27:02,016201032964,TRAFFIC,drop,2562,2024/03/18 11:27:02,218.227.63.84,138.188.111.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:27:02,0,1,58914,70,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:27:02,0,any,,7299323811576121559,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:27:02.277-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:27:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 70
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 218.227.63.84
serverIP: 138.188.111.69
|
Explain this syslog message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,165.222.69.140,75.49.243.185,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41923,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:45:44",
"message": "<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,165.222.69.140,75.49.243.185,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4403,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "165.222.69.140",
"serverIP": "75.49.243.185"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,165.222.69.140,75.49.243.185,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,165.222.69.140,75.49.243.185,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41923
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:45:44
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4403
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 165.222.69.140
serverIP: 75.49.243.185
|
Explain this syslog message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,89.63.188.173,60.193.10.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41923,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:45:44",
"message": "<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,89.63.188.173,60.193.10.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4403,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "89.63.188.173",
"serverIP": "60.193.10.118"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,89.63.188.173,60.193.10.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:45:44 DC1-PA3220-1 1,2024/03/18 11:45:44,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:44,89.63.188.173,60.193.10.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:44,0,1,41923,4403,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:44,0,any,,7299323811576267893,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:44.288-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41923
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:45:44
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4403
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 89.63.188.173
serverIP: 60.193.10.118
|
Explain this syslog message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,183.112.109.227,246.87.15.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53968,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:25:40",
"message": "<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,183.112.109.227,246.87.15.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "183.112.109.227",
"serverIP": "246.87.15.52"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,183.112.109.227,246.87.15.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,183.112.109.227,246.87.15.52,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53968
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:25:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 183.112.109.227
serverIP: 246.87.15.52
|
Explain this syslog message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,134.57.158.31,54.48.57.129,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53968,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:25:40",
"message": "<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,134.57.158.31,54.48.57.129,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "134.57.158.31",
"serverIP": "54.48.57.129"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,134.57.158.31,54.48.57.129,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:25:40 DC1-PA3220-1 1,2024/03/18 11:25:40,016201032964,TRAFFIC,drop,2562,2024/03/18 11:25:40,134.57.158.31,54.48.57.129,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:25:40,0,1,53968,22,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:25:39,0,any,,7299323811576111998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:25:40.202-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53968
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:25:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 134.57.158.31
serverIP: 54.48.57.129
|
Explain this syslog message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,127.23.107.18,119.67.48.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35480,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:45:23",
"message": "<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,127.23.107.18,119.67.48.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8702,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "127.23.107.18",
"serverIP": "119.67.48.186"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,127.23.107.18,119.67.48.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,127.23.107.18,119.67.48.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35480
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:45:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8702
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 127.23.107.18
serverIP: 119.67.48.186
|
Explain this syslog message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,74.195.217.38,232.106.146.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35480,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:45:23",
"message": "<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,74.195.217.38,232.106.146.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8702,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "74.195.217.38",
"serverIP": "232.106.146.16"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,74.195.217.38,232.106.146.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:45:23 DC1-PA3220-1 1,2024/03/18 11:45:23,016201032964,TRAFFIC,drop,2562,2024/03/18 11:45:23,74.195.217.38,232.106.146.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:45:23,0,1,35480,8702,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:45:23,0,any,,7299323811576265375,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:45:23.386-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35480
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:45:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8702
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 74.195.217.38
serverIP: 232.106.146.16
|
Explain this syslog message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,97.140.107.221,83.202.209.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42310,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:49:43",
"message": "<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,97.140.107.221,83.202.209.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5104,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "97.140.107.221",
"serverIP": "83.202.209.219"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,97.140.107.221,83.202.209.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,97.140.107.221,83.202.209.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42310
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:49:43
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5104
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 97.140.107.221
serverIP: 83.202.209.219
|
Explain this syslog message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,242.50.185.153,202.42.133.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42310,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 11:49:43",
"message": "<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,242.50.185.153,202.42.133.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5104,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "242.50.185.153",
"serverIP": "202.42.133.31"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,242.50.185.153,202.42.133.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:49:43 DC1-PA3220-1 1,2024/03/18 11:49:43,016201032964,TRAFFIC,drop,2562,2024/03/18 11:49:43,242.50.185.153,202.42.133.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 11:49:43,0,1,42310,5104,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 11:49:42,0,any,,7299323811576295314,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T11:49:43.328-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42310
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 11:49:43
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5104
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 242.50.185.153
serverIP: 202.42.133.31
|
Explain this syslog message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,7.201.12.67,5.12.224.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48367,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 12:21:00",
"message": "<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,7.201.12.67,5.12.224.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "7.201.12.67",
"serverIP": "5.12.224.20"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,7.201.12.67,5.12.224.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,7.201.12.67,5.12.224.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48367
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 12:21:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 7.201.12.67
serverIP: 5.12.224.20
|
Explain this syslog message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,201.14.68.184,93.204.143.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48367,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Mar 18 12:21:00",
"message": "<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,201.14.68.184,93.204.143.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "201.14.68.184",
"serverIP": "93.204.143.127"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,201.14.68.184,93.204.143.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 12:21:00 DC1-PA3220-1 1,2024/03/18 12:21:00,016201032964,TRAFFIC,drop,2562,2024/03/18 12:21:00,201.14.68.184,93.204.143.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/03/18 12:21:00,0,1,48367,3389,0,0,0x0,tcp,deny,60,60,0,1,2024/03/18 12:21:00,0,any,,7299323811576508572,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-03-18T12:21:00.698-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48367
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Mar 18 12:21:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 201.14.68.184
serverIP: 93.204.143.127
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.177.137.34,93.120.28.242,98.173.153.94,93.120.28.242,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49880,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.177.137.34,93.120.28.242,98.173.153.94,93.120.28.242,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "21.177.137.34",
"serverIP": "93.120.28.242"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.177.137.34,93.120.28.242,98.173.153.94,93.120.28.242,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.177.137.34,93.120.28.242,98.173.153.94,93.120.28.242,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49880
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 21.177.137.34
serverIP: 93.120.28.242
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,82.120.217.131,133.83.20.173,207.114.222.230,133.83.20.173,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,8826,1,49884,443,19593,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888604,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49884,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,82.120.217.131,133.83.20.173,207.114.222.230,133.83.20.173,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,8826,1,49884,443,19593,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888604,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "82.120.217.131",
"serverIP": "133.83.20.173"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,82.120.217.131,133.83.20.173,207.114.222.230,133.83.20.173,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,8826,1,49884,443,19593,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888604,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,82.120.217.131,133.83.20.173,207.114.222.230,133.83.20.173,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,8826,1,49884,443,19593,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888604,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49884
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 82.120.217.131
serverIP: 133.83.20.173
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,233.60.60.121,180.171.52.28,98.173.153.94,180.171.52.28,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,23143,1,49883,443,57249,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888603,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49883,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,233.60.60.121,180.171.52.28,98.173.153.94,180.171.52.28,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,23143,1,49883,443,57249,443,0x403400,tcp,block-url,\"ads.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888603,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "233.60.60.121",
"serverIP": "180.171.52.28"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,233.60.60.121,180.171.52.28,98.173.153.94,180.171.52.28,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,23143,1,49883,443,57249,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888603,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,233.60.60.121,180.171.52.28,98.173.153.94,180.171.52.28,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,23143,1,49883,443,57249,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888603,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49883
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 233.60.60.121
serverIP: 180.171.52.28
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.40.125.205,185.112.29.5,207.114.222.230,185.112.29.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,51571,1,49879,443,50303,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888602,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49879,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.40.125.205,185.112.29.5,207.114.222.230,185.112.29.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,51571,1,49879,443,50303,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888602,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "128.40.125.205",
"serverIP": "185.112.29.5"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.40.125.205,185.112.29.5,207.114.222.230,185.112.29.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,51571,1,49879,443,50303,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888602,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.40.125.205,185.112.29.5,207.114.222.230,185.112.29.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,51571,1,49879,443,50303,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888602,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49879
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 128.40.125.205
serverIP: 185.112.29.5
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,210.167.30.121,130.224.225.143,207.114.222.230,130.224.225.143,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7463,1,49875,443,35519,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888601,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49875,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,210.167.30.121,130.224.225.143,207.114.222.230,130.224.225.143,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7463,1,49875,443,35519,443,0x403400,tcp,block-url,\"ads.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888601,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "210.167.30.121",
"serverIP": "130.224.225.143"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,210.167.30.121,130.224.225.143,207.114.222.230,130.224.225.143,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7463,1,49875,443,35519,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888601,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,210.167.30.121,130.224.225.143,207.114.222.230,130.224.225.143,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7463,1,49875,443,35519,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888601,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49875
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 210.167.30.121
serverIP: 130.224.225.143
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,168.68.1.141,172.119.169.93,207.114.222.230,172.119.169.93,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24564,1,49882,443,14022,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888600,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49882,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,168.68.1.141,172.119.169.93,207.114.222.230,172.119.169.93,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24564,1,49882,443,14022,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888600,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "168.68.1.141",
"serverIP": "172.119.169.93"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,168.68.1.141,172.119.169.93,207.114.222.230,172.119.169.93,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24564,1,49882,443,14022,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888600,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,168.68.1.141,172.119.169.93,207.114.222.230,172.119.169.93,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24564,1,49882,443,14022,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888600,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49882
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 168.68.1.141
serverIP: 172.119.169.93
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,188.215.184.123,242.150.250.187,207.114.222.230,242.150.250.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,17921,1,49881,443,3261,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888599,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49881,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,188.215.184.123,242.150.250.187,207.114.222.230,242.150.250.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,17921,1,49881,443,3261,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888599,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "188.215.184.123",
"serverIP": "242.150.250.187"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,188.215.184.123,242.150.250.187,207.114.222.230,242.150.250.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,17921,1,49881,443,3261,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888599,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,188.215.184.123,242.150.250.187,207.114.222.230,242.150.250.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,17921,1,49881,443,3261,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888599,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49881
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 188.215.184.123
serverIP: 242.150.250.187
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,83.51.161.143,189.209.109.240,207.114.222.230,189.209.109.240,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49859,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,83.51.161.143,189.209.109.240,207.114.222.230,189.209.109.240,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "83.51.161.143",
"serverIP": "189.209.109.240"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,83.51.161.143,189.209.109.240,207.114.222.230,189.209.109.240,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,83.51.161.143,189.209.109.240,207.114.222.230,189.209.109.240,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49859
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 83.51.161.143
serverIP: 189.209.109.240
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,153.208.10.87,228.124.85.36,98.173.153.94,228.124.85.36,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,55911,1,49878,443,4991,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888597,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49878,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,153.208.10.87,228.124.85.36,98.173.153.94,228.124.85.36,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,55911,1,49878,443,4991,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888597,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "153.208.10.87",
"serverIP": "228.124.85.36"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,153.208.10.87,228.124.85.36,98.173.153.94,228.124.85.36,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,55911,1,49878,443,4991,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888597,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,153.208.10.87,228.124.85.36,98.173.153.94,228.124.85.36,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,55911,1,49878,443,4991,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888597,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49878
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 153.208.10.87
serverIP: 228.124.85.36
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,129.33.83.171,165.137.3.70,207.114.222.230,165.137.3.70,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,21772,1,49873,443,54487,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888595,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49873,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,129.33.83.171,165.137.3.70,207.114.222.230,165.137.3.70,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,21772,1,49873,443,54487,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888595,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "129.33.83.171",
"serverIP": "165.137.3.70"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,129.33.83.171,165.137.3.70,207.114.222.230,165.137.3.70,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,21772,1,49873,443,54487,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888595,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,129.33.83.171,165.137.3.70,207.114.222.230,165.137.3.70,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,21772,1,49873,443,54487,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888595,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49873
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 129.33.83.171
serverIP: 165.137.3.70
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,190.190.129.83,127.203.95.20,98.173.153.94,127.203.95.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49857,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,190.190.129.83,127.203.95.20,98.173.153.94,127.203.95.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "190.190.129.83",
"serverIP": "127.203.95.20"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,190.190.129.83,127.203.95.20,98.173.153.94,127.203.95.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,190.190.129.83,127.203.95.20,98.173.153.94,127.203.95.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49857
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 190.190.129.83
serverIP: 127.203.95.20
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,185.246.173.149,209.97.167.31,207.114.222.230,209.97.167.31,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,11137,1,49877,443,3671,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888594,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49877,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,185.246.173.149,209.97.167.31,207.114.222.230,209.97.167.31,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,11137,1,49877,443,3671,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888594,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "185.246.173.149",
"serverIP": "209.97.167.31"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,185.246.173.149,209.97.167.31,207.114.222.230,209.97.167.31,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,11137,1,49877,443,3671,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888594,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.