input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Sep 10 18:07:40 DC1-PA3220-1 1,2023/09/10 18:07:40,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:40,243.18.223.160,144.171.106.202,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:40,0,1,48681,2345,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:39,0,any,,7263933890074606748,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:40.869-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48681
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 10 18:07:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2345
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 243.18.223.160
serverIP: 144.171.106.202
|
Explain this syslog message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 61088,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 10 18:07:34",
"message": "<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 25798,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "225.54.75.162",
"serverIP": "157.53.202.191"
}
|
Create a JSON artifact from the message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 61088
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 10 18:07:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 25798
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 225.54.75.162
serverIP: 157.53.202.191
|
Explain this syslog message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 61088,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 10 18:07:34",
"message": "<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 25798,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "222.238.234.171",
"serverIP": "242.121.41.198"
}
|
Create a JSON artifact from the message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 61088
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 10 18:07:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 25798
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 222.238.234.171
serverIP: 242.121.41.198
|
Explain this syslog message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40775,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 10 18:07:42",
"message": "<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4029,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "53.218.27.53",
"serverIP": "113.87.176.240"
}
|
Create a JSON artifact from the message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40775
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 10 18:07:42
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4029
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 53.218.27.53
serverIP: 113.87.176.240
|
Explain this syslog message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40775,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 10 18:07:42",
"message": "<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4029,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "35.150.194.224",
"serverIP": "231.112.170.174"
}
|
Create a JSON artifact from the message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40775
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 10 18:07:42
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4029
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 35.150.194.224
serverIP: 231.112.170.174
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
|
{
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "109.135.214.53",
"serverIP": "86.141.155.209"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 109.135.214.53
serverIP: 86.141.155.209
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
|
{
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "252.149.193.13",
"serverIP": "167.51.143.221"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 252.149.193.13
serverIP: 167.51.143.221
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
|
{
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "204.128.76.155",
"serverIP": "150.82.104.236"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 204.128.76.155
serverIP: 150.82.104.236
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
|
{
"action": "block",
"message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 1,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "44.79.23.58",
"serverIP": "232.219.146.120"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
messagetype: anomalous_behavior
program: l7_firewall
protocol: 1
senderhost: 192.168.2.250
sensitivity: normal
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 44.79.23.58
serverIP: 232.219.146.120
|
Explain this syslog message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,\"pagead2.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62711,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "227.226.145.92",
"serverIP": "180.189.136.249"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62711
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 227.226.145.92
serverIP: 180.189.136.249
|
Explain this syslog message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,\"pagead2.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62711,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "132.182.250.118",
"serverIP": "116.49.63.248"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62711
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 132.182.250.118
serverIP: 116.49.63.248
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62715,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "244.13.127.83",
"serverIP": "57.150.255.227"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62715
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 244.13.127.83
serverIP: 57.150.255.227
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62715,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "46.143.48.220",
"serverIP": "105.39.65.137"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62715
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 46.143.48.220
serverIP: 105.39.65.137
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62719,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "170.3.69.163",
"serverIP": "59.82.33.165"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62719
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 170.3.69.163
serverIP: 59.82.33.165
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62719,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "139.184.248.164",
"serverIP": "21.27.178.112"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62719
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 139.184.248.164
serverIP: 21.27.178.112
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,\"ad.turn.com/\",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62760,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "130.180.21.8",
"serverIP": "127.66.179.125"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62760
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 130.180.21.8
serverIP: 127.66.179.125
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,\"ad.turn.com/\",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62760,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "172.34.33.14",
"serverIP": "199.81.200.78"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62760
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 172.34.33.14
serverIP: 199.81.200.78
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,\"pixel.rubiconproject.com/\",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62782,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "43.210.63.68",
"serverIP": "116.69.168.94"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62782
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 43.210.63.68
serverIP: 116.69.168.94
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,\"pixel.rubiconproject.com/\",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62782,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "200.93.66.113",
"serverIP": "64.147.94.81"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62782
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 200.93.66.113
serverIP: 64.147.94.81
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62786,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "157.27.179.176",
"serverIP": "108.179.230.234"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62786
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 157.27.179.176
serverIP: 108.179.230.234
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62786,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "196.206.100.160",
"serverIP": "135.96.49.124"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62786
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 196.206.100.160
serverIP: 135.96.49.124
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62715,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "27.131.117.216",
"serverIP": "104.99.37.177"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62715
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 27.131.117.216
serverIP: 104.99.37.177
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:22",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62715,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "106.225.134.250",
"serverIP": "64.20.188.249"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:22
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62715
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 106.225.134.250
serverIP: 64.20.188.249
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62719,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "198.226.201.227",
"serverIP": "240.161.150.187"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62719
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 198.226.201.227
serverIP: 240.161.150.187
|
Explain this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62719,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "200.255.4.71",
"serverIP": "29.52.20.206"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62719
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 200.255.4.71
serverIP: 29.52.20.206
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62786,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "55.37.217.99",
"serverIP": "176.152.21.126"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62786
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 55.37.217.99
serverIP: 176.152.21.126
|
Explain this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:08:23",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62786,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "48.78.110.180",
"serverIP": "24.51.190.4"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:08:23
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62786
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 48.78.110.180
serverIP: 24.51.190.4
|
Explain this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"CPB-BH-PA220",
"facebook-base",
"firewall_log"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"umbrellaial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62853,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "215.244.235.223",
"serverIP": "56.64.238.204"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-BH-PA220', 'facebook-base', 'firewall_log']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62853
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 215.244.235.223
serverIP: 56.64.238.204
|
Explain this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"CPB-BH-PA220",
"facebook-base",
"firewall_log"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"oscorpial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62853,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "122.71.127.42",
"serverIP": "47.50.58.38"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-BH-PA220', 'facebook-base', 'firewall_log']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62853
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 122.71.127.42
serverIP: 47.50.58.38
|
Explain this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62861,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "2.190.85.18",
"serverIP": "46.56.186.245"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62861
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 2.190.85.18
serverIP: 46.56.186.245
|
Explain this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62861,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "24.70.174.122",
"serverIP": "51.65.195.233"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62861
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 24.70.174.122
serverIP: 51.65.195.233
|
Explain this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:31",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62870,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "223.24.194.64",
"serverIP": "186.56.219.233"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:31
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62870
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 223.24.194.64
serverIP: 186.56.219.233
|
Explain this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:31",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62870,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "234.56.206.34",
"serverIP": "53.91.27.57"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:31
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62870
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 234.56.206.34
serverIP: 53.91.27.57
|
Explain this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62861,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "180.151.22.30",
"serverIP": "195.134.179.239"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62861
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 180.151.22.30
serverIP: 195.134.179.239
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.