input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,0.172.172.35,236.229.77.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 38665,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:05",
"message": "<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,0.172.172.35,236.229.77.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "0.172.172.35",
"serverIP": "236.229.77.138"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,0.172.172.35,236.229.77.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:05 DC1-PA3220-1 1,2023/12/16 21:24:05,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:05,0.172.172.35,236.229.77.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:05,0,1,38665,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:02,0,any,,7299323810715468569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:05.647-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 38665
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:05
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 0.172.172.35
serverIP: 236.229.77.138
|
Explain this syslog message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,3.92.194.41,101.16.24.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47374,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:25:59",
"message": "<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,3.92.194.41,101.16.24.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10001,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "3.92.194.41",
"serverIP": "101.16.24.20"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,3.92.194.41,101.16.24.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,3.92.194.41,101.16.24.20,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47374
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:25:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10001
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 3.92.194.41
serverIP: 101.16.24.20
|
Explain this syslog message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,122.225.67.110,174.115.123.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47374,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:25:59",
"message": "<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,122.225.67.110,174.115.123.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10001,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "122.225.67.110",
"serverIP": "174.115.123.98"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,122.225.67.110,174.115.123.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:25:59 DC1-PA3220-1 1,2023/12/16 21:25:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:59,122.225.67.110,174.115.123.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:59,0,1,47374,10001,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:25:56,0,any,,7299323810715481489,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:59.628-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47374
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:25:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10001
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 122.225.67.110
serverIP: 174.115.123.98
|
Explain this syslog message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,37.200.171.27,155.53.106.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 138,
"clientpackets": 1,
"clientport": 12262,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:25:19",
"message": "<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,37.200.171.27,155.53.106.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8080,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 138,
"streamName": "pan_firewall",
"clientIP": "37.200.171.27",
"serverIP": "155.53.106.66"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,37.200.171.27,155.53.106.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,37.200.171.27,155.53.106.66,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 138
clientpackets: 1
clientport: 12262
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:25:19
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8080
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 138
streamName: pan_firewall
clientIP: 37.200.171.27
serverIP: 155.53.106.66
|
Explain this syslog message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,55.85.219.154,29.171.191.29,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 138,
"clientpackets": 1,
"clientport": 12262,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:25:19",
"message": "<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,55.85.219.154,29.171.191.29,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8080,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 138,
"streamName": "pan_firewall",
"clientIP": "55.85.219.154",
"serverIP": "29.171.191.29"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,55.85.219.154,29.171.191.29,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:25:19 DC1-PA3220-1 1,2023/12/16 21:25:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:25:19,55.85.219.154,29.171.191.29,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:25:19,0,1,12262,8080,0,0,0x0,udp,deny,138,138,0,1,2023/12/16 21:25:16,0,any,,7299323810715476960,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:25:19.627-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 138
clientpackets: 1
clientport: 12262
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:25:19
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8080
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 138
streamName: pan_firewall
clientIP: 55.85.219.154
serverIP: 29.171.191.29
|
Explain this syslog message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,88.208.255.180,68.98.233.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51039,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:45",
"message": "<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,88.208.255.180,68.98.233.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3367,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "88.208.255.180",
"serverIP": "68.98.233.186"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,88.208.255.180,68.98.233.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,88.208.255.180,68.98.233.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51039
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:45
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3367
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 88.208.255.180
serverIP: 68.98.233.186
|
Explain this syslog message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,99.32.215.191,35.176.219.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51039,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:45",
"message": "<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,99.32.215.191,35.176.219.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3367,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "99.32.215.191",
"serverIP": "35.176.219.36"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,99.32.215.191,35.176.219.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:45 DC1-PA3220-1 1,2023/12/16 21:27:45,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:45,99.32.215.191,35.176.219.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:45,0,1,51039,3367,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:41,0,any,,7299323810715493345,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:45.668-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51039
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:45
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3367
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 99.32.215.191
serverIP: 35.176.219.36
|
Explain this syslog message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,170.92.109.214,129.153.255.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 41335,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:52",
"message": "<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,170.92.109.214,129.153.255.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "170.92.109.214",
"serverIP": "129.153.255.146"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,170.92.109.214,129.153.255.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,170.92.109.214,129.153.255.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 41335
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 170.92.109.214
serverIP: 129.153.255.146
|
Explain this syslog message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,165.167.127.43,152.149.144.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 41335,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:24:52",
"message": "<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,165.167.127.43,152.149.144.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "165.167.127.43",
"serverIP": "152.149.144.171"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,165.167.127.43,152.149.144.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:24:52 DC1-PA3220-1 1,2023/12/16 21:24:52,016201032964,TRAFFIC,drop,2562,2023/12/16 21:24:52,165.167.127.43,152.149.144.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:24:52,0,1,41335,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:24:48,0,any,,7299323810715473947,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:24:52.569-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 41335
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:24:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 165.167.127.43
serverIP: 152.149.144.171
|
Explain this syslog message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,235.87.29.91,118.216.162.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 40265,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:26:29",
"message": "<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,235.87.29.91,118.216.162.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "235.87.29.91",
"serverIP": "118.216.162.88"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,235.87.29.91,118.216.162.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,235.87.29.91,118.216.162.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 40265
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:26:29
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 235.87.29.91
serverIP: 118.216.162.88
|
Explain this syslog message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,244.247.85.255,50.179.62.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 40265,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:26:29",
"message": "<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,244.247.85.255,50.179.62.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "244.247.85.255",
"serverIP": "50.179.62.105"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,244.247.85.255,50.179.62.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:26:29 DC1-PA3220-1 1,2023/12/16 21:26:29,016201032964,TRAFFIC,drop,2562,2023/12/16 21:26:29,244.247.85.255,50.179.62.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:26:29,0,1,40265,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/16 21:26:26,0,any,,7299323810715484827,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:26:29.726-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 40265
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:26:29
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 244.247.85.255
serverIP: 50.179.62.105
|
Explain this syslog message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,145.101.125.48,52.232.195.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50802,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:11",
"message": "<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,145.101.125.48,52.232.195.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2375,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "145.101.125.48",
"serverIP": "52.232.195.148"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,145.101.125.48,52.232.195.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,145.101.125.48,52.232.195.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50802
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:11
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2375
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 145.101.125.48
serverIP: 52.232.195.148
|
Explain this syslog message
|
<14>Dec 16 21:27:18 DC1-PA3220-1 1,2023/12/16 21:27:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:18,186.82.239.125,136.120.79.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:18,0,1,53162,14609,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:15,0,any,,7299323810715490517,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:18.571-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53162,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:18",
"message": "<14>Dec 16 21:27:18 DC1-PA3220-1 1,2023/12/16 21:27:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:18,186.82.239.125,136.120.79.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:18,0,1,53162,14609,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:15,0,any,,7299323810715490517,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:18.571-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 14609,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "186.82.239.125",
"serverIP": "136.120.79.197"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:18 DC1-PA3220-1 1,2023/12/16 21:27:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:18,186.82.239.125,136.120.79.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:18,0,1,53162,14609,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:15,0,any,,7299323810715490517,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:18.571-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:18 DC1-PA3220-1 1,2023/12/16 21:27:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:18,186.82.239.125,136.120.79.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:18,0,1,53162,14609,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:15,0,any,,7299323810715490517,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:18.571-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53162
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 14609
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 186.82.239.125
serverIP: 136.120.79.197
|
Explain this syslog message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,57.240.219.119,205.111.153.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 50802,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:11",
"message": "<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,57.240.219.119,205.111.153.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2375,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "57.240.219.119",
"serverIP": "205.111.153.217"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,57.240.219.119,205.111.153.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:11 DC1-PA3220-1 1,2023/12/16 21:27:11,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:11,57.240.219.119,205.111.153.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:11,0,1,50802,2375,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:07,0,any,,7299323810715489797,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:11.506-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 50802
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:11
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2375
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 57.240.219.119
serverIP: 205.111.153.217
|
Explain this syslog message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,99.129.254.223,254.40.66.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49752,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:59",
"message": "<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,99.129.254.223,254.40.66.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3390,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "99.129.254.223",
"serverIP": "254.40.66.124"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,99.129.254.223,254.40.66.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,99.129.254.223,254.40.66.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49752
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3390
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 99.129.254.223
serverIP: 254.40.66.124
|
Explain this syslog message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,133.101.146.128,25.236.162.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49752,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:27:59",
"message": "<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,133.101.146.128,25.236.162.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3390,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "133.101.146.128",
"serverIP": "25.236.162.79"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,133.101.146.128,25.236.162.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:27:59 DC1-PA3220-1 1,2023/12/16 21:27:59,016201032964,TRAFFIC,drop,2562,2023/12/16 21:27:59,133.101.146.128,25.236.162.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:27:59,0,1,49752,3390,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:27:56,0,any,,7299323810715494998,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:27:59.630-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49752
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:27:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3390
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 133.101.146.128
serverIP: 25.236.162.79
|
Explain this syslog message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,50.225.81.186,71.92.252.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59312,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:29:04",
"message": "<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,50.225.81.186,71.92.252.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 19734,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "50.225.81.186",
"serverIP": "71.92.252.186"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,50.225.81.186,71.92.252.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,50.225.81.186,71.92.252.186,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59312
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:29:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 19734
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 50.225.81.186
serverIP: 71.92.252.186
|
Explain this syslog message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,100.253.92.186,11.95.160.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59312,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:29:04",
"message": "<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,100.253.92.186,11.95.160.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 19734,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "100.253.92.186",
"serverIP": "11.95.160.151"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,100.253.92.186,11.95.160.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:29:04 DC1-PA3220-1 1,2023/12/16 21:29:04,016201032964,TRAFFIC,drop,2562,2023/12/16 21:29:04,100.253.92.186,11.95.160.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:29:04,0,1,59312,19734,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:29:01,0,any,,7299323810715501941,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:29:04.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59312
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:29:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 19734
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 100.253.92.186
serverIP: 11.95.160.151
|
Explain this syslog message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,211.15.47.245,243.106.225.35,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42417,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:33:18",
"message": "<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,211.15.47.245,243.106.225.35,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "211.15.47.245",
"serverIP": "243.106.225.35"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,211.15.47.245,243.106.225.35,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,211.15.47.245,243.106.225.35,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42417
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:33:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2222
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 211.15.47.245
serverIP: 243.106.225.35
|
Explain this syslog message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,130.142.50.44,238.37.178.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42417,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:33:18",
"message": "<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,130.142.50.44,238.37.178.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "130.142.50.44",
"serverIP": "238.37.178.147"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,130.142.50.44,238.37.178.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:33:18 DC1-PA3220-1 1,2023/12/16 21:33:18,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:18,130.142.50.44,238.37.178.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:18,0,1,42417,2222,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:15,0,any,,7299323810715530417,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:18.585-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42417
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:33:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2222
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 130.142.50.44
serverIP: 238.37.178.147
|
Explain this syslog message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,21.11.221.248,31.28.101.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53055,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:36:02",
"message": "<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,21.11.221.248,31.28.101.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "21.11.221.248",
"serverIP": "31.28.101.152"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,21.11.221.248,31.28.101.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,21.11.221.248,31.28.101.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53055
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:36:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 21.11.221.248
serverIP: 31.28.101.152
|
Explain this syslog message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,133.217.101.187,247.162.147.10,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53055,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:36:02",
"message": "<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,133.217.101.187,247.162.147.10,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "133.217.101.187",
"serverIP": "247.162.147.10"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,133.217.101.187,247.162.147.10,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:36:02 DC1-PA3220-1 1,2023/12/16 21:36:02,016201032964,TRAFFIC,drop,2562,2023/12/16 21:36:02,133.217.101.187,247.162.147.10,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:36:02,0,1,53055,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:35:58,0,any,,7299323810715547941,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:36:02.162-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53055
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:36:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 133.217.101.187
serverIP: 247.162.147.10
|
Explain this syslog message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,13.199.218.32,100.151.35.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64663,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:38:40",
"message": "<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,13.199.218.32,100.151.35.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "13.199.218.32",
"serverIP": "100.151.35.36"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,13.199.218.32,100.151.35.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,13.199.218.32,100.151.35.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64663
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:38:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 13.199.218.32
serverIP: 100.151.35.36
|
Explain this syslog message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,120.196.175.158,199.98.66.110,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64663,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:38:40",
"message": "<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,120.196.175.158,199.98.66.110,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "120.196.175.158",
"serverIP": "199.98.66.110"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,120.196.175.158,199.98.66.110,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:38:40 DC1-PA3220-1 1,2023/12/16 21:38:40,016201032964,TRAFFIC,drop,2562,2023/12/16 21:38:40,120.196.175.158,199.98.66.110,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:38:40,0,1,64663,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:38:37,0,any,,7299323810715566054,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:38:40.588-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64663
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:38:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 120.196.175.158
serverIP: 199.98.66.110
|
Explain this syslog message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,30.32.202.66,59.207.208.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:32:55",
"message": "<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,30.32.202.66,59.207.208.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "30.32.202.66",
"serverIP": "59.207.208.143"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,30.32.202.66,59.207.208.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,30.32.202.66,59.207.208.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:32:55
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 30.32.202.66
serverIP: 59.207.208.143
|
Explain this syslog message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,171.48.212.34,214.30.170.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:32:55",
"message": "<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,171.48.212.34,214.30.170.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "171.48.212.34",
"serverIP": "214.30.170.193"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,171.48.212.34,214.30.170.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:32:55 DC1-PA3220-1 1,2023/12/16 21:32:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:32:55,171.48.212.34,214.30.170.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/12/16 21:32:55,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2023/12/16 21:32:47,0,any,,7299323810715527787,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:32:55.674-08:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:32:55
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 171.48.212.34
serverIP: 214.30.170.193
|
Explain this syslog message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,169.120.96.212,204.26.114.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54715,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:33:19",
"message": "<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,169.120.96.212,204.26.114.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3329,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "169.120.96.212",
"serverIP": "204.26.114.79"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,169.120.96.212,204.26.114.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,169.120.96.212,204.26.114.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54715
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:33:19
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3329
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 169.120.96.212
serverIP: 204.26.114.79
|
Explain this syslog message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,213.80.200.71,204.251.112.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54715,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:33:19",
"message": "<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,213.80.200.71,204.251.112.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3329,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "213.80.200.71",
"serverIP": "204.251.112.171"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,213.80.200.71,204.251.112.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:33:19 DC1-PA3220-1 1,2023/12/16 21:33:19,016201032964,TRAFFIC,drop,2562,2023/12/16 21:33:19,213.80.200.71,204.251.112.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:33:19,0,1,54715,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:33:16,0,any,,7299323810715530523,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:33:19.637-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54715
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:33:19
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3329
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 213.80.200.71
serverIP: 204.251.112.171
|
Explain this syslog message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,168.244.250.38,40.228.101.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 67,
"clientpackets": 1,
"clientport": 41580,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:35:00",
"message": "<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,168.244.250.38,40.228.101.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27015,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "168.244.250.38",
"serverIP": "40.228.101.160"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,168.244.250.38,40.228.101.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,168.244.250.38,40.228.101.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 67
clientpackets: 1
clientport: 41580
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:35:00
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27015
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 168.244.250.38
serverIP: 40.228.101.160
|
Explain this syslog message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,208.69.191.224,101.148.145.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 67,
"clientpackets": 1,
"clientport": 41580,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:35:00",
"message": "<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,208.69.191.224,101.148.145.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27015,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "208.69.191.224",
"serverIP": "101.148.145.80"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,208.69.191.224,101.148.145.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:35:00 DC1-PA3220-1 1,2023/12/16 21:35:00,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:00,208.69.191.224,101.148.145.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:00,0,1,41580,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:34:57,0,any,,7299323810715541339,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:00.661-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 67
clientpackets: 1
clientport: 41580
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:35:00
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27015
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 208.69.191.224
serverIP: 101.148.145.80
|
Explain this syslog message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,151.169.39.80,69.64.80.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 67,
"clientpackets": 1,
"clientport": 38183,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:35:09",
"message": "<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,151.169.39.80,69.64.80.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27015,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "151.169.39.80",
"serverIP": "69.64.80.1"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,151.169.39.80,69.64.80.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,151.169.39.80,69.64.80.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 67
clientpackets: 1
clientport: 38183
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:35:09
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27015
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 151.169.39.80
serverIP: 69.64.80.1
|
Explain this syslog message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,19.196.47.226,129.128.105.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 67,
"clientpackets": 1,
"clientport": 38183,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:35:09",
"message": "<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,19.196.47.226,129.128.105.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 27015,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "19.196.47.226",
"serverIP": "129.128.105.31"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,19.196.47.226,129.128.105.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:35:09 DC1-PA3220-1 1,2023/12/16 21:35:09,016201032964,TRAFFIC,drop,2562,2023/12/16 21:35:09,19.196.47.226,129.128.105.31,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:35:09,0,1,38183,27015,0,0,0x0,udp,deny,67,67,0,1,2023/12/16 21:35:05,0,any,,7299323810715542370,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:35:09.609-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 67
clientpackets: 1
clientport: 38183
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:35:09
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 27015
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 19.196.47.226
serverIP: 129.128.105.31
|
Explain this syslog message
|
<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,39.80.93.6,78.85.147.28,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 61433,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:34:55",
"message": "<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,39.80.93.6,78.85.147.28,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 47358,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "78.85.147.28",
"serverIP": "39.80.93.6"
}
|
Create a JSON artifact from the message
|
<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,39.80.93.6,78.85.147.28,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,39.80.93.6,78.85.147.28,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 61433
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 16 21:34:55
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 47358
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 78.85.147.28
serverIP: 39.80.93.6
|
Explain this syslog message
|
<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,116.21.83.121,152.68.226.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 61433,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 16 21:34:55",
"message": "<14>Dec 16 21:34:55 DC1-PA3220-1 1,2023/12/16 21:34:55,016201032964,TRAFFIC,drop,2562,2023/12/16 21:34:55,116.21.83.121,152.68.226.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/16 21:34:55,0,1,47358,61433,0,0,0x0,tcp,deny,60,60,0,1,2023/12/16 21:34:52,0,any,,7299323810715540877,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-16T21:34:55.660-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 47358,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "152.68.226.67",
"serverIP": "116.21.83.121"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.