input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Apr 27 12:51:02 DC1-PA3220-1 1,2023/04/27 12:51:01,016201032964,TRAFFIC,drop,2560,2023/04/27 12:51:01,45.39.93.150,109.233.126.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:51:01,0,1,44186,9443,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:51:02,0,any,0,5135915751,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:51:02.875-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44186
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:51:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 45.39.93.150
serverIP: 109.233.126.149
|
Explain this syslog message
|
<14>Apr 27 12:51:02 DC1-PA3220-1 1,2023/04/27 12:51:01,016201032964,TRAFFIC,drop,2560,2023/04/27 12:51:01,105.180.68.171,217.85.60.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:51:01,0,1,44186,9443,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:51:02,0,any,0,5135915751,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:51:02.875-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44186,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:51:02",
"message": "<14>Apr 27 12:51:02 DC1-PA3220-1 1,2023/04/27 12:51:01,016201032964,TRAFFIC,drop,2560,2023/04/27 12:51:01,105.180.68.171,217.85.60.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:51:01,0,1,44186,9443,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:51:02,0,any,0,5135915751,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:51:02.875-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "105.180.68.171",
"serverIP": "217.85.60.53"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:51:02 DC1-PA3220-1 1,2023/04/27 12:51:01,016201032964,TRAFFIC,drop,2560,2023/04/27 12:51:01,105.180.68.171,217.85.60.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:51:01,0,1,44186,9443,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:51:02,0,any,0,5135915751,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:51:02.875-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:51:02 DC1-PA3220-1 1,2023/04/27 12:51:01,016201032964,TRAFFIC,drop,2560,2023/04/27 12:51:01,105.180.68.171,217.85.60.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:51:01,0,1,44186,9443,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:51:02,0,any,0,5135915751,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:51:02.875-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44186
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:51:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 105.180.68.171
serverIP: 217.85.60.53
|
Explain this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,191.244.225.172,93.145.228.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46726,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:37:39",
"message": "<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,191.244.225.172,93.145.228.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7192,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "191.244.225.172",
"serverIP": "93.145.228.229"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,191.244.225.172,93.145.228.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,191.244.225.172,93.145.228.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46726
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:37:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7192
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 191.244.225.172
serverIP: 93.145.228.229
|
Explain this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,50.70.182.61,178.146.188.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46726,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:37:39",
"message": "<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,50.70.182.61,178.146.188.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7192,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "50.70.182.61",
"serverIP": "178.146.188.133"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,50.70.182.61,178.146.188.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,50.70.182.61,178.146.188.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46726
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:37:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7192
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 50.70.182.61
serverIP: 178.146.188.133
|
Explain this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,60.254.211.85,48.235.51.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46726,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:37:39",
"message": "<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,60.254.211.85,48.235.51.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7192,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "60.254.211.85",
"serverIP": "48.235.51.242"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,60.254.211.85,48.235.51.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,60.254.211.85,48.235.51.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46726
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:37:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7192
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 60.254.211.85
serverIP: 48.235.51.242
|
Explain this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,30.147.108.184,145.68.172.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46726,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:37:39",
"message": "<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,30.147.108.184,145.68.172.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7192,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "30.147.108.184",
"serverIP": "145.68.172.219"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,30.147.108.184,145.68.172.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:37:39 DC1-PA3220-1 1,2023/04/27 12:37:38,016201032964,TRAFFIC,drop,2560,2023/04/27 12:37:38,30.147.108.184,145.68.172.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:37:38,0,1,46726,7192,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:37:39,0,any,0,5135820065,0x0,Bulgaria,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:37:39.601-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46726
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:37:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7192
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 30.147.108.184
serverIP: 145.68.172.219
|
Explain this syslog message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,181.119.148.44,123.143.168.12,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 50802,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:48:49",
"message": "<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,181.119.148.44,123.143.168.12,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 40738,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "123.143.168.12",
"serverIP": "181.119.148.44"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,181.119.148.44,123.143.168.12,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,181.119.148.44,123.143.168.12,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 50802
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:48:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 40738
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 123.143.168.12
serverIP: 181.119.148.44
|
Explain this syslog message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,217.91.40.247,68.6.21.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 50802,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 27 12:48:49",
"message": "<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,217.91.40.247,68.6.21.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 40738,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "68.6.21.84",
"serverIP": "217.91.40.247"
}
|
Create a JSON artifact from the message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,217.91.40.247,68.6.21.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 27 12:48:49 DC1-PA3220-1 1,2023/04/27 12:48:48,016201032964,TRAFFIC,drop,2560,2023/04/27 12:48:48,217.91.40.247,68.6.21.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/27 12:48:48,0,1,40738,50802,0,0,0x0,tcp,deny,60,60,0,1,2023/04/27 12:48:48,0,any,0,5135900697,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-27T12:48:49.848-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 50802
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 27 12:48:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 40738
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 68.6.21.84
serverIP: 217.91.40.247
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=135.106.239.220 dst=84.156.143.199 protocol=tcp sport=443 dport=53182 decision=blocked
|
{
"action": "block",
"clientport": 53182,
"message": "<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=135.106.239.220 dst=84.156.143.199 protocol=tcp sport=443 dport=53182 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "84.156.143.199",
"serverIP": "135.106.239.220"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=135.106.239.220 dst=84.156.143.199 protocol=tcp sport=443 dport=53182 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=135.106.239.220 dst=84.156.143.199 protocol=tcp sport=443 dport=53182 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53182
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 84.156.143.199
serverIP: 135.106.239.220
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=156.139.248.2 dst=70.217.115.99 protocol=tcp sport=443 dport=53182 decision=blocked
|
{
"action": "block",
"clientport": 53182,
"message": "<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=156.139.248.2 dst=70.217.115.99 protocol=tcp sport=443 dport=53182 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "70.217.115.99",
"serverIP": "156.139.248.2"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=156.139.248.2 dst=70.217.115.99 protocol=tcp sport=443 dport=53182 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=156.139.248.2 dst=70.217.115.99 protocol=tcp sport=443 dport=53182 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53182
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 70.217.115.99
serverIP: 156.139.248.2
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=237.173.222.232 dst=86.228.142.19 protocol=tcp sport=443 dport=53182 decision=blocked
|
{
"action": "block",
"clientport": 53182,
"message": "<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=237.173.222.232 dst=86.228.142.19 protocol=tcp sport=443 dport=53182 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "86.228.142.19",
"serverIP": "237.173.222.232"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=237.173.222.232 dst=86.228.142.19 protocol=tcp sport=443 dport=53182 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=237.173.222.232 dst=86.228.142.19 protocol=tcp sport=443 dport=53182 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53182
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 86.228.142.19
serverIP: 237.173.222.232
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=81.132.142.22 dst=171.151.80.155 protocol=tcp sport=443 dport=53182 decision=blocked
|
{
"action": "block",
"clientport": 53182,
"message": "<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=81.132.142.22 dst=171.151.80.155 protocol=tcp sport=443 dport=53182 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "171.151.80.155",
"serverIP": "81.132.142.22"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=81.132.142.22 dst=171.151.80.155 protocol=tcp sport=443 dport=53182 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1686977540.209270585 NORDC_MX400_1 l7_firewall src=81.132.142.22 dst=171.151.80.155 protocol=tcp sport=443 dport=53182 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53182
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 171.151.80.155
serverIP: 81.132.142.22
|
Explain this syslog message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,134.190.134.172,111.208.50.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 106,
"clientpackets": 1,
"clientport": 40005,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 3 20:44:21",
"message": "<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,134.190.134.172,111.208.50.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17185,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 106,
"streamName": "pan_firewall",
"clientIP": "134.190.134.172",
"serverIP": "111.208.50.189"
}
|
Create a JSON artifact from the message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,134.190.134.172,111.208.50.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,134.190.134.172,111.208.50.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 106
clientpackets: 1
clientport: 40005
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 3 20:44:21
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17185
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 106
streamName: pan_firewall
clientIP: 134.190.134.172
serverIP: 111.208.50.189
|
Explain this syslog message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,145.161.116.187,25.98.27.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 106,
"clientpackets": 1,
"clientport": 40005,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 3 20:44:21",
"message": "<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,145.161.116.187,25.98.27.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17185,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 106,
"streamName": "pan_firewall",
"clientIP": "145.161.116.187",
"serverIP": "25.98.27.253"
}
|
Create a JSON artifact from the message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,145.161.116.187,25.98.27.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 3 20:44:21 DC1-PA3220-1 1,2023/08/03 20:44:20,016201032964,TRAFFIC,drop,2561,2023/08/03 20:44:20,145.161.116.187,25.98.27.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:44:20,0,1,40005,17185,0,0,0x0,udp,deny,106,106,0,1,2023/08/03 20:44:20,0,any,,7250965734509418056,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:44:21.346-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 106
clientpackets: 1
clientport: 40005
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 3 20:44:21
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17185
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 106
streamName: pan_firewall
clientIP: 145.161.116.187
serverIP: 25.98.27.253
|
Explain this syslog message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,140.60.206.171,7.52.245.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59266,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 3 20:45:30",
"message": "<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,140.60.206.171,7.52.245.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7132,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "140.60.206.171",
"serverIP": "7.52.245.114"
}
|
Create a JSON artifact from the message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,140.60.206.171,7.52.245.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,140.60.206.171,7.52.245.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59266
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 3 20:45:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7132
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 140.60.206.171
serverIP: 7.52.245.114
|
Explain this syslog message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,225.161.167.67,201.154.104.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59266,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 3 20:45:30",
"message": "<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,225.161.167.67,201.154.104.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7132,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "225.161.167.67",
"serverIP": "201.154.104.242"
}
|
Create a JSON artifact from the message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,225.161.167.67,201.154.104.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 3 20:45:30 DC1-PA3220-1 1,2023/08/03 20:45:29,016201032964,TRAFFIC,drop,2561,2023/08/03 20:45:29,225.161.167.67,201.154.104.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/03 20:45:29,0,1,59266,7132,0,0,0x0,tcp,deny,60,60,0,1,2023/08/03 20:45:29,0,any,,7250965734509424251,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-03T20:45:30.823-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59266
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 3 20:45:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7132
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 225.161.167.67
serverIP: 201.154.104.242
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=221.204.246.164 dst=27.79.56.114 protocol=tcp sport=53471 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=221.204.246.164 dst=27.79.56.114 protocol=tcp sport=53471 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53471,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "221.204.246.164",
"serverIP": "27.79.56.114"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=221.204.246.164 dst=27.79.56.114 protocol=tcp sport=53471 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=221.204.246.164 dst=27.79.56.114 protocol=tcp sport=53471 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53471
protocol: 6
streamName: meraki_l7_firewall
clientIP: 221.204.246.164
serverIP: 27.79.56.114
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=31.191.197.34 dst=30.250.214.210 protocol=tcp sport=53471 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=31.191.197.34 dst=30.250.214.210 protocol=tcp sport=53471 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53471,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "31.191.197.34",
"serverIP": "30.250.214.210"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=31.191.197.34 dst=30.250.214.210 protocol=tcp sport=53471 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=31.191.197.34 dst=30.250.214.210 protocol=tcp sport=53471 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53471
protocol: 6
streamName: meraki_l7_firewall
clientIP: 31.191.197.34
serverIP: 30.250.214.210
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=220.128.114.17 dst=4.134.133.144 protocol=tcp sport=53471 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=220.128.114.17 dst=4.134.133.144 protocol=tcp sport=53471 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53471,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "220.128.114.17",
"serverIP": "4.134.133.144"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=220.128.114.17 dst=4.134.133.144 protocol=tcp sport=53471 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=220.128.114.17 dst=4.134.133.144 protocol=tcp sport=53471 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53471
protocol: 6
streamName: meraki_l7_firewall
clientIP: 220.128.114.17
serverIP: 4.134.133.144
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=70.235.133.112 dst=218.2.57.151 protocol=tcp sport=53471 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=70.235.133.112 dst=218.2.57.151 protocol=tcp sport=53471 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 53471,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "70.235.133.112",
"serverIP": "218.2.57.151"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=70.235.133.112 dst=218.2.57.151 protocol=tcp sport=53471 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067135.029939408 M57_MX67C_PanamaCity l7_firewall src=70.235.133.112 dst=218.2.57.151 protocol=tcp sport=53471 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 53471
protocol: 6
streamName: meraki_l7_firewall
clientIP: 70.235.133.112
serverIP: 218.2.57.151
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=14.102.91.2 dst=186.254.174.238 protocol=tcp sport=54974 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=14.102.91.2 dst=186.254.174.238 protocol=tcp sport=54974 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54974,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "14.102.91.2",
"serverIP": "186.254.174.238"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=14.102.91.2 dst=186.254.174.238 protocol=tcp sport=54974 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=14.102.91.2 dst=186.254.174.238 protocol=tcp sport=54974 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54974
protocol: 6
streamName: meraki_l7_firewall
clientIP: 14.102.91.2
serverIP: 186.254.174.238
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=34.121.242.196 dst=58.247.90.73 protocol=tcp sport=54974 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=34.121.242.196 dst=58.247.90.73 protocol=tcp sport=54974 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54974,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "34.121.242.196",
"serverIP": "58.247.90.73"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=34.121.242.196 dst=58.247.90.73 protocol=tcp sport=54974 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=34.121.242.196 dst=58.247.90.73 protocol=tcp sport=54974 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54974
protocol: 6
streamName: meraki_l7_firewall
clientIP: 34.121.242.196
serverIP: 58.247.90.73
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=225.175.183.210 dst=210.31.19.227 protocol=tcp sport=54974 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=225.175.183.210 dst=210.31.19.227 protocol=tcp sport=54974 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54974,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "225.175.183.210",
"serverIP": "210.31.19.227"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=225.175.183.210 dst=210.31.19.227 protocol=tcp sport=54974 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=225.175.183.210 dst=210.31.19.227 protocol=tcp sport=54974 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54974
protocol: 6
streamName: meraki_l7_firewall
clientIP: 225.175.183.210
serverIP: 210.31.19.227
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=113.57.188.253 dst=108.80.135.170 protocol=tcp sport=54974 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=113.57.188.253 dst=108.80.135.170 protocol=tcp sport=54974 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 54974,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "113.57.188.253",
"serverIP": "108.80.135.170"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=113.57.188.253 dst=108.80.135.170 protocol=tcp sport=54974 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1656067151.635968648 M57_MX67C_PanamaCity l7_firewall src=113.57.188.253 dst=108.80.135.170 protocol=tcp sport=54974 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 54974
protocol: 6
streamName: meraki_l7_firewall
clientIP: 113.57.188.253
serverIP: 108.80.135.170
|
Explain this syslog message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,170.226.1.120,19.248.180.75,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44110,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 23 15:28:27",
"message": "<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,170.226.1.120,19.248.180.75,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2995,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "170.226.1.120",
"serverIP": "19.248.180.75"
}
|
Create a JSON artifact from the message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,170.226.1.120,19.248.180.75,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,170.226.1.120,19.248.180.75,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44110
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 23 15:28:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2995
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 170.226.1.120
serverIP: 19.248.180.75
|
Explain this syslog message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,238.8.60.122,134.91.198.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44110,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 23 15:28:27",
"message": "<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,238.8.60.122,134.91.198.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2995,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "238.8.60.122",
"serverIP": "134.91.198.206"
}
|
Create a JSON artifact from the message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,238.8.60.122,134.91.198.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 23 15:28:27 DC1-PA3220-1 1,2023/06/23 15:28:26,016201032964,TRAFFIC,drop,2560,2023/06/23 15:28:26,238.8.60.122,134.91.198.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/23 15:28:26,0,1,44110,2995,0,0,0x0,tcp,deny,60,60,0,1,2023/06/23 15:28:25,0,any,0,5786036944,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-23T15:28:27.157-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44110
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 23 15:28:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2995
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 238.8.60.122
serverIP: 134.91.198.206
|
Explain this syslog message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,112.19.17.70,176.209.49.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 39585,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:23:20",
"message": "<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,112.19.17.70,176.209.49.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "112.19.17.70",
"serverIP": "176.209.49.214"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,112.19.17.70,176.209.49.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,112.19.17.70,176.209.49.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 39585
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:23:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 112.19.17.70
serverIP: 176.209.49.214
|
Explain this syslog message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,202.200.212.167,247.5.42.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 39585,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:23:20",
"message": "<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,202.200.212.167,247.5.42.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "202.200.212.167",
"serverIP": "247.5.42.9"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,202.200.212.167,247.5.42.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:23:20 DC1-PA3220-1 1,2023/12/16 21:23:20,016201032964,TRAFFIC,drop,2562,2023/12/16 21:23:20,202.200.212.167,247.5.42.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:23:20,0,1,39585,4432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:23:16,0,any,,7299323810715463229,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:23:20.626-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 39585
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:23:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 202.200.212.167
serverIP: 247.5.42.9
|
Explain this syslog message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,161.187.75.124,148.11.128.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49495,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:49",
"message": "<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,161.187.75.124,148.11.128.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4513,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "161.187.75.124",
"serverIP": "148.11.128.23"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,161.187.75.124,148.11.128.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,161.187.75.124,148.11.128.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49495
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4513
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 161.187.75.124
serverIP: 148.11.128.23
|
Explain this syslog message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,173.52.56.57,206.159.235.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49495,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:49",
"message": "<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,173.52.56.57,206.159.235.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4513,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "173.52.56.57",
"serverIP": "206.159.235.94"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,173.52.56.57,206.159.235.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:49 DC1-PA3220-1 1,2023/12/16 21:24:49,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:49,173.52.56.57,206.159.235.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:49,0,1,49495,4513,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:24:46,0,any,,7299323810715473592,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:49.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49495
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4513
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 173.52.56.57
serverIP: 206.159.235.94
|
Explain this syslog message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,197.225.168.27,241.76.60.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42747,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:29:27",
"message": "<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,197.225.168.27,241.76.60.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "197.225.168.27",
"serverIP": "241.76.60.153"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,197.225.168.27,241.76.60.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,197.225.168.27,241.76.60.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42747
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:29:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 197.225.168.27
serverIP: 241.76.60.153
|
Explain this syslog message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,166.254.126.82,131.162.201.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 42747,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:29:27",
"message": "<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,166.254.126.82,131.162.201.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "166.254.126.82",
"serverIP": "131.162.201.7"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,166.254.126.82,131.162.201.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:29:27 DC1-PA3220-1 1,2023/12/16 21:29:27,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:27,166.254.126.82,131.162.201.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:27,0,1,42747,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:29:23,0,any,,7299323810715504616,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:27.574-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 42747
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:29:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 166.254.126.82
serverIP: 131.162.201.7
|
Explain this syslog message
|
<14>Dec 16 21:29:24 DC1-PA3220-1 1,2023/12/16 21:29:24,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:24,219.237.145.14,222.198.22.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:24,0,1,56484,17037,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:20,0,any,,7299323810715504204,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:24.368-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56484,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:29:24",
"message": "<14>Dec 16 21:29:24 DC1-PA3220-1 1,2023/12/16 21:29:24,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:24,219.237.145.14,222.198.22.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:24,0,1,56484,17037,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:20,0,any,,7299323810715504204,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:24.368-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17037,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "219.237.145.14",
"serverIP": "222.198.22.132"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:29:24 DC1-PA3220-1 1,2023/12/16 21:29:24,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:24,219.237.145.14,222.198.22.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:24,0,1,56484,17037,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:20,0,any,,7299323810715504204,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:24.368-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:29:24 DC1-PA3220-1 1,2023/12/16 21:29:24,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:24,219.237.145.14,222.198.22.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:24,0,1,56484,17037,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:20,0,any,,7299323810715504204,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:24.368-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56484
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:29:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17037
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 219.237.145.14
serverIP: 222.198.22.132
|
Explain this syslog message
|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,9.238.157.74,134.223.13.150,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 38665,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:05",
"message": "<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,9.238.157.74,134.223.13.150,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "9.238.157.74",
"serverIP": "134.223.13.150"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,9.238.157.74,134.223.13.150,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,9.238.157.74,134.223.13.150,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 38665
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:05
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 9.238.157.74
serverIP: 134.223.13.150
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.