input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,185.246.173.149,209.97.167.31,207.114.222.230,209.97.167.31,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,11137,1,49877,443,3671,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888594,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49877
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 185.246.173.149
serverIP: 209.97.167.31
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,142.161.13.255,211.165.6.208,98.173.153.94,211.165.6.208,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,57956,1,49876,443,15500,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888593,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49876,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,142.161.13.255,211.165.6.208,98.173.153.94,211.165.6.208,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,57956,1,49876,443,15500,443,0x403400,tcp,block-url,\"ads.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888593,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "142.161.13.255",
"serverIP": "211.165.6.208"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,142.161.13.255,211.165.6.208,98.173.153.94,211.165.6.208,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,57956,1,49876,443,15500,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888593,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,142.161.13.255,211.165.6.208,98.173.153.94,211.165.6.208,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,57956,1,49876,443,15500,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888593,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49876
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 142.161.13.255
serverIP: 211.165.6.208
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,121.132.34.218,166.46.76.106,207.114.222.230,166.46.76.106,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,34197,1,49869,443,13532,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888589,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49869,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,121.132.34.218,166.46.76.106,207.114.222.230,166.46.76.106,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,34197,1,49869,443,13532,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888589,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "121.132.34.218",
"serverIP": "166.46.76.106"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,121.132.34.218,166.46.76.106,207.114.222.230,166.46.76.106,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,34197,1,49869,443,13532,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888589,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,121.132.34.218,166.46.76.106,207.114.222.230,166.46.76.106,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,34197,1,49869,443,13532,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888589,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49869
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 121.132.34.218
serverIP: 166.46.76.106
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,215.19.254.43,197.46.252.158,98.173.153.94,197.46.252.158,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49868,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,215.19.254.43,197.46.252.158,98.173.153.94,197.46.252.158,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,\"ap.lijit.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "215.19.254.43",
"serverIP": "197.46.252.158"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,215.19.254.43,197.46.252.158,98.173.153.94,197.46.252.158,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,215.19.254.43,197.46.252.158,98.173.153.94,197.46.252.158,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49868
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 215.19.254.43
serverIP: 197.46.252.158
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,186.101.172.59,94.59.149.26,207.114.222.230,94.59.149.26,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49871,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,186.101.172.59,94.59.149.26,207.114.222.230,94.59.149.26,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,\"image4.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "186.101.172.59",
"serverIP": "94.59.149.26"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,186.101.172.59,94.59.149.26,207.114.222.230,94.59.149.26,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,186.101.172.59,94.59.149.26,207.114.222.230,94.59.149.26,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49871
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 186.101.172.59
serverIP: 94.59.149.26
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,231.88.40.53,148.41.64.47,98.173.153.94,148.41.64.47,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,12868,1,49874,443,26121,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888592,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49874,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,231.88.40.53,148.41.64.47,98.173.153.94,148.41.64.47,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,12868,1,49874,443,26121,443,0x403400,tcp,block-url,\"ads.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888592,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "231.88.40.53",
"serverIP": "148.41.64.47"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,231.88.40.53,148.41.64.47,98.173.153.94,148.41.64.47,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,12868,1,49874,443,26121,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888592,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,231.88.40.53,148.41.64.47,98.173.153.94,148.41.64.47,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,12868,1,49874,443,26121,443,0x403400,tcp,block-url,"ads.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888592,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49874
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 231.88.40.53
serverIP: 148.41.64.47
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,86.205.151.114,101.116.135.200,207.114.222.230,101.116.135.200,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,10843,1,49858,443,34893,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888585,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49858,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,86.205.151.114,101.116.135.200,207.114.222.230,101.116.135.200,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,10843,1,49858,443,34893,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888585,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "86.205.151.114",
"serverIP": "101.116.135.200"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,86.205.151.114,101.116.135.200,207.114.222.230,101.116.135.200,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,10843,1,49858,443,34893,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888585,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,86.205.151.114,101.116.135.200,207.114.222.230,101.116.135.200,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,10843,1,49858,443,34893,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888585,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49858
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 86.205.151.114
serverIP: 101.116.135.200
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,159.179.42.251,112.127.181.219,98.173.153.94,112.127.181.219,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,41367,1,49870,443,37694,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888591,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49870,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,159.179.42.251,112.127.181.219,98.173.153.94,112.127.181.219,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,41367,1,49870,443,37694,443,0x403400,tcp,block-url,\"x.bidswitch.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888591,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "159.179.42.251",
"serverIP": "112.127.181.219"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,159.179.42.251,112.127.181.219,98.173.153.94,112.127.181.219,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,41367,1,49870,443,37694,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888591,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,159.179.42.251,112.127.181.219,98.173.153.94,112.127.181.219,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,41367,1,49870,443,37694,443,0x403400,tcp,block-url,"x.bidswitch.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888591,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.584-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49870
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 159.179.42.251
serverIP: 112.127.181.219
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,243.1.173.29,246.26.243.24,98.173.153.94,246.26.243.24,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,30912,1,49862,443,24465,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888581,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49862,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,243.1.173.29,246.26.243.24,98.173.153.94,246.26.243.24,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,30912,1,49862,443,24465,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888581,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "243.1.173.29",
"serverIP": "246.26.243.24"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,243.1.173.29,246.26.243.24,98.173.153.94,246.26.243.24,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,30912,1,49862,443,24465,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888581,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,243.1.173.29,246.26.243.24,98.173.153.94,246.26.243.24,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,30912,1,49862,443,24465,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888581,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49862
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 243.1.173.29
serverIP: 246.26.243.24
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,180.157.93.101,149.234.155.163,207.114.222.230,149.234.155.163,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49863,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,180.157.93.101,149.234.155.163,207.114.222.230,149.234.155.163,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,\"ads.yieldmo.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "180.157.93.101",
"serverIP": "149.234.155.163"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,180.157.93.101,149.234.155.163,207.114.222.230,149.234.155.163,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,180.157.93.101,149.234.155.163,207.114.222.230,149.234.155.163,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49863
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 180.157.93.101
serverIP: 149.234.155.163
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,68.150.63.144,235.150.243.59,207.114.222.230,235.150.243.59,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24559,1,49867,443,12765,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888583,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49867,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,68.150.63.144,235.150.243.59,207.114.222.230,235.150.243.59,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24559,1,49867,443,12765,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888583,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "68.150.63.144",
"serverIP": "235.150.243.59"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,68.150.63.144,235.150.243.59,207.114.222.230,235.150.243.59,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24559,1,49867,443,12765,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888583,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,68.150.63.144,235.150.243.59,207.114.222.230,235.150.243.59,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24559,1,49867,443,12765,443,0x403400,tcp,block-url,"ib.adnxs.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888583,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49867
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 68.150.63.144
serverIP: 235.150.243.59
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,79.196.53.199,105.55.251.101,207.114.222.230,105.55.251.101,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49872,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,79.196.53.199,105.55.251.101,207.114.222.230,105.55.251.101,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,\"image4.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "79.196.53.199",
"serverIP": "105.55.251.101"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,79.196.53.199,105.55.251.101,207.114.222.230,105.55.251.101,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,79.196.53.199,105.55.251.101,207.114.222.230,105.55.251.101,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49872
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 79.196.53.199
serverIP: 105.55.251.101
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.215.231.247,196.145.75.20,98.173.153.94,196.145.75.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49860,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.215.231.247,196.145.75.20,98.173.153.94,196.145.75.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,\"ap.lijit.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "21.215.231.247",
"serverIP": "196.145.75.20"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.215.231.247,196.145.75.20,98.173.153.94,196.145.75.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,21.215.231.247,196.145.75.20,98.173.153.94,196.145.75.20,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49860
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 21.215.231.247
serverIP: 196.145.75.20
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,1.77.88.137,113.10.250.76,207.114.222.230,113.10.250.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49852,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,1.77.88.137,113.10.250.76,207.114.222.230,113.10.250.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "1.77.88.137",
"serverIP": "113.10.250.76"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,1.77.88.137,113.10.250.76,207.114.222.230,113.10.250.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,1.77.88.137,113.10.250.76,207.114.222.230,113.10.250.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49852
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 1.77.88.137
serverIP: 113.10.250.76
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.93.240.78,202.42.120.52,98.173.153.94,202.42.120.52,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49880,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.93.240.78,202.42.120.52,98.173.153.94,202.42.120.52,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "128.93.240.78",
"serverIP": "202.42.120.52"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.93.240.78,202.42.120.52,98.173.153.94,202.42.120.52,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,128.93.240.78,202.42.120.52,98.173.153.94,202.42.120.52,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,267,1,49880,443,30430,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888605,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.586-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49880
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 128.93.240.78
serverIP: 202.42.120.52
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,58.31.119.43,65.82.84.205,207.114.222.230,65.82.84.205,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49859,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,58.31.119.43,65.82.84.205,207.114.222.230,65.82.84.205,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "58.31.119.43",
"serverIP": "65.82.84.205"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,58.31.119.43,65.82.84.205,207.114.222.230,65.82.84.205,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,58.31.119.43,65.82.84.205,207.114.222.230,65.82.84.205,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,64242,1,49859,443,38457,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888598,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49859
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 58.31.119.43
serverIP: 65.82.84.205
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,207.34.189.66,116.146.119.92,98.173.153.94,116.146.119.92,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49857,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,207.34.189.66,116.146.119.92,98.173.153.94,116.146.119.92,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "207.34.189.66",
"serverIP": "116.146.119.92"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,207.34.189.66,116.146.119.92,98.173.153.94,116.146.119.92,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,207.34.189.66,116.146.119.92,98.173.153.94,116.146.119.92,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,16609,1,49857,443,31465,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888596,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.585-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49857
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 207.34.189.66
serverIP: 116.146.119.92
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,50.1.185.33,226.94.37.102,207.114.222.230,226.94.37.102,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49852,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,50.1.185.33,226.94.37.102,207.114.222.230,226.94.37.102,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,\"cm.adform.net/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "50.1.185.33",
"serverIP": "226.94.37.102"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,50.1.185.33,226.94.37.102,207.114.222.230,226.94.37.102,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,50.1.185.33,226.94.37.102,207.114.222.230,226.94.37.102,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,5368,1,49852,443,30978,443,0x403400,tcp,block-url,"cm.adform.net/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888578,0x8000000000000000,10.0.0.0-10.255.255.255,Denmark,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.581-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49852
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 50.1.185.33
serverIP: 226.94.37.102
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,134.139.205.171,185.220.253.177,98.173.153.94,185.220.253.177,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49868,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,134.139.205.171,185.220.253.177,98.173.153.94,185.220.253.177,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,\"ap.lijit.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "134.139.205.171",
"serverIP": "185.220.253.177"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,134.139.205.171,185.220.253.177,98.173.153.94,185.220.253.177,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,134.139.205.171,185.220.253.177,98.173.153.94,185.220.253.177,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,24319,1,49868,443,15365,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888588,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49868
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 134.139.205.171
serverIP: 185.220.253.177
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,63.116.156.110,184.15.255.215,98.173.153.94,184.15.255.215,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49860,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,63.116.156.110,184.15.255.215,98.173.153.94,184.15.255.215,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,\"ap.lijit.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "63.116.156.110",
"serverIP": "184.15.255.215"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,63.116.156.110,184.15.255.215,98.173.153.94,184.15.255.215,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,63.116.156.110,184.15.255.215,98.173.153.94,184.15.255.215,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,25255,1,49860,443,43205,443,0x403400,tcp,block-url,"ap.lijit.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888584,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.582-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49860
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 63.116.156.110
serverIP: 184.15.255.215
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,20.38.220.99,200.165.129.76,207.114.222.230,200.165.129.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49871,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,20.38.220.99,200.165.129.76,207.114.222.230,200.165.129.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,\"image4.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "20.38.220.99",
"serverIP": "200.165.129.76"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,20.38.220.99,200.165.129.76,207.114.222.230,200.165.129.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,20.38.220.99,200.165.129.76,207.114.222.230,200.165.129.76,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,56521,1,49871,443,63878,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888587,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49871
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 20.38.220.99
serverIP: 200.165.129.76
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,120.105.106.157,97.126.0.136,207.114.222.230,97.126.0.136,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49872,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,120.105.106.157,97.126.0.136,207.114.222.230,97.126.0.136,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,\"image4.pubmatic.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "120.105.106.157",
"serverIP": "97.126.0.136"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,120.105.106.157,97.126.0.136,207.114.222.230,97.126.0.136,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,120.105.106.157,97.126.0.136,207.114.222.230,97.126.0.136,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,7872,1,49872,443,18893,443,0x403400,tcp,block-url,"image4.pubmatic.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888590,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49872
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 120.105.106.157
serverIP: 97.126.0.136
|
Explain this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,28.184.9.124,178.223.6.113,207.114.222.230,178.223.6.113,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
{
"action": "block",
"clientport": 49863,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "CPB-LJ-PA220.SDPB.LOCAL",
"localstarttime": "2024/03/18 11:03:35",
"message": "<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,28.184.9.124,178.223.6.113,207.114.222.230,178.223.6.113,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,\"ads.yieldmo.com/\",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,ssl,no,no,",
"messagetype": "firewall_log",
"priority": 14,
"protocol": 6,
"rulecategory": "N/A",
"rulename": "IT Users Outbound",
"senderhost": "10.87.2.11",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"ssl",
"rfc3164",
"pan_firewall",
"9999(9999)",
"CPB-LJ-PA220",
"firewall_log"
],
"streamName": "pan_firewall",
"clientIP": "28.184.9.124",
"serverIP": "178.223.6.113"
}
|
Create a JSON artifact from the message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,28.184.9.124,178.223.6.113,207.114.222.230,178.223.6.113,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Mar 18 11:03:35 CPB-LJ-PA220.SDPB.LOCAL 1,2024/03/18 11:03:35,012801149901,THREAT,url,2562,2024/03/18 11:03:35,28.184.9.124,178.223.6.113,207.114.222.230,178.223.6.113,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2024/03/18 11:03:35,9604,1,49863,443,3328,443,0x403400,tcp,block-url,"ads.yieldmo.com/",9999(9999),web-advertisements,informational,client-to-server,7344415838759888586,0x8000000000000000,10.0.0.0-10.255.255.255,United States,,,0,,,0,,,,,,,,0,27,95,0,0,,CPB-LJ-PA220,,,,,0,,0,,N/A,N/A,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",f8df782e-4140-4788-9ec2-ce1bd916b7c7,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-03-18T11:03:35.583-07:00,,,,encrypted-tunnel,networking,browser-based,4,"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use",,ssl,no,no,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
clientport: 49863
facilitycode: 1
facilitylabel: user-level
localhostname: CPB-LJ-PA220.SDPB.LOCAL
localstarttime: 2024/03/18 11:03:35
messagetype: firewall_log
priority: 14
protocol: 6
rulecategory: N/A
rulename: IT Users Outbound
senderhost: 10.87.2.11
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['ssl', 'rfc3164', 'pan_firewall', '9999(9999)', 'CPB-LJ-PA220', 'firewall_log']
streamName: pan_firewall
clientIP: 28.184.9.124
serverIP: 178.223.6.113
|
Explain this syslog message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,237.91.229.2,49.178.237.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 2897,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:22:30",
"message": "<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,237.91.229.2,49.178.237.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "237.91.229.2",
"serverIP": "49.178.237.148"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,237.91.229.2,49.178.237.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,237.91.229.2,49.178.237.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 2897
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:22:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 237.91.229.2
serverIP: 49.178.237.148
|
Explain this syslog message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,56.190.64.220,3.142.158.68,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 2897,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:22:30",
"message": "<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,56.190.64.220,3.142.158.68,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "56.190.64.220",
"serverIP": "3.142.158.68"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,56.190.64.220,3.142.158.68,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:22:30 DC1-PA3220-1 1,2023/10/23 03:22:29,016201032964,TRAFFIC,drop,2562,2023/10/23 03:22:29,56.190.64.220,3.142.158.68,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:22:29,0,1,2897,23,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:22:29,0,any,,7263933890480828238,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:22:30.579-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 2897
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:22:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 56.190.64.220
serverIP: 3.142.158.68
|
Explain this syslog message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,179.120.134.88,33.68.57.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47078,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:26:04",
"message": "<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,179.120.134.88,33.68.57.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 12345,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "179.120.134.88",
"serverIP": "33.68.57.160"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,179.120.134.88,33.68.57.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,179.120.134.88,33.68.57.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47078
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:26:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 12345
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 179.120.134.88
serverIP: 33.68.57.160
|
Explain this syslog message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,93.244.171.104,103.42.74.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47078,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:26:04",
"message": "<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,93.244.171.104,103.42.74.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 12345,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "93.244.171.104",
"serverIP": "103.42.74.85"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,93.244.171.104,103.42.74.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:26:04 DC1-PA3220-1 1,2023/10/23 03:26:04,016201032964,TRAFFIC,drop,2562,2023/10/23 03:26:04,93.244.171.104,103.42.74.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:26:04,0,1,47078,12345,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:26:03,0,any,,7263933890480842493,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:26:04.850-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47078
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:26:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 12345
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 93.244.171.104
serverIP: 103.42.74.85
|
Explain this syslog message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,162.28.201.137,12.113.252.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55138,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:30:07",
"message": "<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,162.28.201.137,12.113.252.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "162.28.201.137",
"serverIP": "12.113.252.33"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,162.28.201.137,12.113.252.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,162.28.201.137,12.113.252.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55138
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:30:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 162.28.201.137
serverIP: 12.113.252.33
|
Explain this syslog message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,140.235.95.149,34.201.182.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55138,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:30:07",
"message": "<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,140.235.95.149,34.201.182.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "140.235.95.149",
"serverIP": "34.201.182.240"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,140.235.95.149,34.201.182.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:30:07 DC1-PA3220-1 1,2023/10/23 03:30:06,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:06,140.235.95.149,34.201.182.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:06,0,1,55138,81,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:07,0,any,,7263933890480858779,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:07.602-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55138
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:30:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 140.235.95.149
serverIP: 34.201.182.240
|
Explain this syslog message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,35.175.28.239,143.184.97.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 60809,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:31:47",
"message": "<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,35.175.28.239,143.184.97.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8782,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "35.175.28.239",
"serverIP": "143.184.97.77"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,35.175.28.239,143.184.97.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,35.175.28.239,143.184.97.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 60809
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:31:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8782
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 35.175.28.239
serverIP: 143.184.97.77
|
Explain this syslog message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,193.10.71.136,43.215.213.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 60809,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:31:47",
"message": "<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,193.10.71.136,43.215.213.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8782,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "193.10.71.136",
"serverIP": "43.215.213.14"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,193.10.71.136,43.215.213.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:31:47 DC1-PA3220-1 1,2023/10/23 03:31:46,016201032964,TRAFFIC,drop,2562,2023/10/23 03:31:46,193.10.71.136,43.215.213.14,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:31:46,0,1,60809,8782,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:31:46,0,any,,7263933890480865618,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:31:47.363-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 60809
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:31:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8782
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 193.10.71.136
serverIP: 43.215.213.14
|
Explain this syslog message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,242.182.158.179,108.35.45.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64887,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:30:23",
"message": "<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,242.182.158.179,108.35.45.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "242.182.158.179",
"serverIP": "108.35.45.148"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,242.182.158.179,108.35.45.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,242.182.158.179,108.35.45.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64887
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:30:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 242.182.158.179
serverIP: 108.35.45.148
|
Explain this syslog message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,238.126.154.240,37.115.224.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64887,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:30:23",
"message": "<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,238.126.154.240,37.115.224.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "238.126.154.240",
"serverIP": "37.115.224.247"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,238.126.154.240,37.115.224.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:30:23 DC1-PA3220-1 1,2023/10/23 03:30:23,016201032964,TRAFFIC,drop,2562,2023/10/23 03:30:23,238.126.154.240,37.115.224.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:30:23,0,1,64887,22,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:30:23,0,any,,7263933890480859876,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:30:23.747-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64887
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:30:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 238.126.154.240
serverIP: 37.115.224.247
|
Explain this syslog message
|
<14>Oct 23 03:32:03 DC1-PA3220-1 1,2023/10/23 03:32:02,016201032964,TRAFFIC,drop,2562,2023/10/23 03:32:02,67.18.234.5,101.39.253.11,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:32:02,0,1,59285,8790,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:32:02,0,any,,7263933890480866708,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:32:03.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59285,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Oct 23 03:32:03",
"message": "<14>Oct 23 03:32:03 DC1-PA3220-1 1,2023/10/23 03:32:02,016201032964,TRAFFIC,drop,2562,2023/10/23 03:32:02,67.18.234.5,101.39.253.11,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:32:02,0,1,59285,8790,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:32:02,0,any,,7263933890480866708,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:32:03.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8790,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "67.18.234.5",
"serverIP": "101.39.253.11"
}
|
Create a JSON artifact from the message
|
<14>Oct 23 03:32:03 DC1-PA3220-1 1,2023/10/23 03:32:02,016201032964,TRAFFIC,drop,2562,2023/10/23 03:32:02,67.18.234.5,101.39.253.11,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:32:02,0,1,59285,8790,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:32:02,0,any,,7263933890480866708,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:32:03.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Oct 23 03:32:03 DC1-PA3220-1 1,2023/10/23 03:32:02,016201032964,TRAFFIC,drop,2562,2023/10/23 03:32:02,67.18.234.5,101.39.253.11,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/10/23 03:32:02,0,1,59285,8790,0,0,0x0,tcp,deny,60,60,0,1,2023/10/23 03:32:02,0,any,,7263933890480866708,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-10-23T03:32:03.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59285
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Oct 23 03:32:03
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8790
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 67.18.234.5
serverIP: 101.39.253.11
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.