input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<14>Sep 10 18:07:40 DC1-PA3220-1 1,2023/09/10 18:07:40,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:40,243.18.223.160,144.171.106.202,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:40,0,1,48681,2345,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:39,0,any,,7263933890074606748,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:40.869-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 48681 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Sep 10 18:07:40 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 2345 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 243.18.223.160 serverIP: 144.171.106.202
Explain this syslog message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
{ "action": "block", "application": "not-applicable", "clientport": 61088, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Sep 10 18:07:34", "message": "<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverbytes": 60, "serverpackets": 1, "serverport": 25798, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "225.54.75.162", "serverIP": "157.53.202.191" }
Create a JSON artifact from the message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,157.53.202.191,225.54.75.162,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientport: 61088 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Sep 10 18:07:34 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverbytes: 60 serverpackets: 1 serverport: 25798 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 225.54.75.162 serverIP: 157.53.202.191
Explain this syslog message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
{ "action": "block", "application": "not-applicable", "clientport": 61088, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Sep 10 18:07:34", "message": "<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverbytes": 60, "serverpackets": 1, "serverport": 25798, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "222.238.234.171", "serverIP": "242.121.41.198" }
Create a JSON artifact from the message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Sep 10 18:07:34 DC1-PA3220-1 1,2023/09/10 18:07:33,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:33,242.121.41.198,222.238.234.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:33,0,1,25798,61088,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:33,0,any,,7263933890074606208,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:34.535-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientport: 61088 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Sep 10 18:07:34 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverbytes: 60 serverpackets: 1 serverport: 25798 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 222.238.234.171 serverIP: 242.121.41.198
Explain this syslog message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 40775, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Sep 10 18:07:42", "message": "<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 4029, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "53.218.27.53", "serverIP": "113.87.176.240" }
Create a JSON artifact from the message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,53.218.27.53,113.87.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 40775 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Sep 10 18:07:42 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 4029 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 53.218.27.53 serverIP: 113.87.176.240
Explain this syslog message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
{ "action": "block", "application": "not-applicable", "clientbytes": 60, "clientpackets": 1, "clientport": 40775, "facilitycode": 1, "facilitylabel": "user-level", "localhostname": "DC1-PA3220-1", "localstarttime": "Sep 10 18:07:42", "message": "<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0", "messagetype": "traffic_drop", "priority": 14, "protocol": 6, "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "sensitivity": "normal", "serverport": 4029, "severitycode": 6, "severitylabel": "informational", "sourceinfo": "unknown", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "totalbytes": 60, "streamName": "pan_firewall", "clientIP": "35.150.194.224", "serverIP": "231.112.170.174" }
Create a JSON artifact from the message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Sep 10 18:07:42 DC1-PA3220-1 1,2023/09/10 18:07:41,016201032964,TRAFFIC,drop,2562,2023/09/10 18:07:41,35.150.194.224,231.112.170.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/10 18:07:41,0,1,40775,4029,0,0,0x0,tcp,deny,60,60,0,1,2023/09/10 18:07:41,0,any,,7263933890074606925,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-10T18:07:42.601-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: action: block application: not-applicable clientbytes: 60 clientpackets: 1 clientport: 40775 facilitycode: 1 facilitylabel: user-level localhostname: DC1-PA3220-1 localstarttime: Sep 10 18:07:42 messagetype: traffic_drop priority: 14 protocol: 6 rulename: Geo Block Inbound senderhost: 10.99.10.30 sensitivity: normal serverport: 4029 severitycode: 6 severitylabel: informational sourceinfo: unknown tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] totalbytes: 60 streamName: pan_firewall clientIP: 35.150.194.224 serverIP: 231.112.170.174
Explain this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "109.135.214.53", "serverIP": "86.141.155.209" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=109.135.214.53 dst=86.141.155.209 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 109.135.214.53 serverIP: 86.141.155.209
Explain this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "252.149.193.13", "serverIP": "167.51.143.221" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=252.149.193.13 dst=167.51.143.221 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 252.149.193.13 serverIP: 167.51.143.221
Explain this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "204.128.76.155", "serverIP": "150.82.104.236" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=204.128.76.155 dst=150.82.104.236 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 204.128.76.155 serverIP: 150.82.104.236
Explain this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
{ "action": "block", "message": "<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 1, "senderhost": "192.168.2.250", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "44.79.23.58", "serverIP": "232.219.146.120" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1685748970.809858991 NORDC_MX400_1 l7_firewall src=44.79.23.58 dst=232.219.146.120 protocol=icmp type=0 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block messagetype: anomalous_behavior program: l7_firewall protocol: 1 senderhost: 192.168.2.250 sensitivity: normal sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 44.79.23.58 serverIP: 232.219.146.120
Explain this syslog message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,\"pagead2.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62711, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "227.226.145.92", "serverIP": "180.189.136.249" }
Create a JSON artifact from the message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,227.226.145.92,180.189.136.249,12.252.112.94,180.189.136.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62711 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 227.226.145.92 serverIP: 180.189.136.249
Explain this syslog message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,\"pagead2.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62711, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "132.182.250.118", "serverIP": "116.49.63.248" }
Create a JSON artifact from the message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:22 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,132.182.250.118,116.49.63.248,12.252.112.94,116.49.63.248,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,581,1,62711,443,6238,443,0x403400,tcp,block-url,"pagead2.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078181,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:22.753-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62711 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 132.182.250.118 serverIP: 116.49.63.248
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62715, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "244.13.127.83", "serverIP": "57.150.255.227" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,244.13.127.83,57.150.255.227,76.80.79.198,57.150.255.227,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62715 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 244.13.127.83 serverIP: 57.150.255.227
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62715, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "46.143.48.220", "serverIP": "105.39.65.137" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,46.143.48.220,105.39.65.137,76.80.79.198,105.39.65.137,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62715 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 46.143.48.220 serverIP: 105.39.65.137
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62719, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "170.3.69.163", "serverIP": "59.82.33.165" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,170.3.69.163,59.82.33.165,76.80.79.198,59.82.33.165,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62719 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 170.3.69.163 serverIP: 59.82.33.165
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62719, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "139.184.248.164", "serverIP": "21.27.178.112" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,139.184.248.164,21.27.178.112,76.80.79.198,21.27.178.112,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62719 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 139.184.248.164 serverIP: 21.27.178.112
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,\"ad.turn.com/\",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62760, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "130.180.21.8", "serverIP": "127.66.179.125" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,130.180.21.8,127.66.179.125,76.80.79.198,127.66.179.125,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62760 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 130.180.21.8 serverIP: 127.66.179.125
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,\"ad.turn.com/\",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62760, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "172.34.33.14", "serverIP": "199.81.200.78" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,172.34.33.14,199.81.200.78,76.80.79.198,199.81.200.78,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,25492,1,62760,443,16073,443,0x403400,tcp,block-url,"ad.turn.com/",(9999),web-advertisements,informational,client-to-server,64078204,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.893-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62760 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 172.34.33.14 serverIP: 199.81.200.78
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,\"pixel.rubiconproject.com/\",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62782, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "43.210.63.68", "serverIP": "116.69.168.94" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,43.210.63.68,116.69.168.94,76.80.79.198,116.69.168.94,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62782 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 43.210.63.68 serverIP: 116.69.168.94
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,\"pixel.rubiconproject.com/\",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62782, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "200.93.66.113", "serverIP": "64.147.94.81" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.93.66.113,64.147.94.81,76.80.79.198,64.147.94.81,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,26479,1,62782,443,45710,443,0x403400,tcp,block-url,"pixel.rubiconproject.com/",(9999),web-advertisements,informational,client-to-server,64078220,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.194-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62782 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 200.93.66.113 serverIP: 64.147.94.81
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62786, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "157.27.179.176", "serverIP": "108.179.230.234" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,157.27.179.176,108.179.230.234,76.80.79.198,108.179.230.234,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62786 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 157.27.179.176 serverIP: 108.179.230.234
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62786, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "196.206.100.160", "serverIP": "135.96.49.124" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,196.206.100.160,135.96.49.124,76.80.79.198,135.96.49.124,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62786 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 196.206.100.160 serverIP: 135.96.49.124
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62715, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "27.131.117.216", "serverIP": "104.99.37.177" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,27.131.117.216,104.99.37.177,76.80.79.198,104.99.37.177,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62715 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 27.131.117.216 serverIP: 104.99.37.177
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,\"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:22", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62715, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "106.225.134.250", "serverIP": "64.20.188.249" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:22,012801150189,THREAT,url,2560,2022/08/09 11:08:22,106.225.134.250,64.20.188.249,76.80.79.198,64.20.188.249,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:22,55093,1,62715,443,33624,443,0x403400,tcp,block-url,"c07383889ee10335bb3b164b4821783b.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078185,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.222-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:22 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62715 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 106.225.134.250 serverIP: 64.20.188.249
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62719, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "198.226.201.227", "serverIP": "240.161.150.187" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,198.226.201.227,240.161.150.187,76.80.79.198,240.161.150.187,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62719 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 198.226.201.227 serverIP: 240.161.150.187
Explain this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,\"tagan.adlightning.com/\",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62719, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "200.255.4.71", "serverIP": "29.52.20.206" }
Create a JSON artifact from the message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:23 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,200.255.4.71,29.52.20.206,76.80.79.198,29.52.20.206,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,32078,1,62719,443,30294,443,0x403400,tcp,block-url,"tagan.adlightning.com/",(9999),web-advertisements,informational,client-to-server,64078188,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:23.543-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62719 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 200.255.4.71 serverIP: 29.52.20.206
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62786, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "55.37.217.99", "serverIP": "176.152.21.126" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,55.37.217.99,176.152.21.126,76.80.79.198,176.152.21.126,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62786 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 55.37.217.99 serverIP: 176.152.21.126
Explain this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "(9999)", "ssl" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,\"ib.adnxs.com/\",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:08:23", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62786, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "48.78.110.180", "serverIP": "24.51.190.4" }
Create a JSON artifact from the message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:08:24 CPB-BH-PA220 1,2022/08/09 11:08:23,012801150189,THREAT,url,2560,2022/08/09 11:08:23,48.78.110.180,24.51.190.4,76.80.79.198,24.51.190.4,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:08:23,51345,1,62786,443,63234,443,0x403400,tcp,block-url,"ib.adnxs.com/",(9999),web-advertisements,informational,client-to-server,64078225,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:08:24.221-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', '(9999)', 'ssl'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:08:23 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62786 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 48.78.110.180 serverIP: 24.51.190.4
Explain this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "CPB-BH-PA220", "facebook-base", "firewall_log" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"umbrellaial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:30", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62853, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "215.244.235.223", "serverIP": "56.64.238.204" }
Create a JSON artifact from the message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,215.244.235.223,56.64.238.204,76.80.79.198,56.64.238.204,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),umbrellaial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-BH-PA220', 'facebook-base', 'firewall_log'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:30 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62853 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 215.244.235.223 serverIP: 56.64.238.204
Explain this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "CPB-BH-PA220", "facebook-base", "firewall_log" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"oscorpial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:30", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62853, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "122.71.127.42", "serverIP": "47.50.58.38" }
Create a JSON artifact from the message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.71.127.42,47.50.58.38,76.80.79.198,47.50.58.38,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,41088,1,62853,443,17550,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,64078459,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.013-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-BH-PA220', 'facebook-base', 'firewall_log'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:30 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62853 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 122.71.127.42 serverIP: 47.50.58.38
Explain this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:30", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62861, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "2.190.85.18", "serverIP": "46.56.186.245" }
Create a JSON artifact from the message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,2.190.85.18,46.56.186.245,12.252.112.94,46.56.186.245,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:30 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62861 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 2.190.85.18 serverIP: 46.56.186.245
Explain this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:30", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62861, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "24.70.174.122", "serverIP": "51.65.195.233" }
Create a JSON artifact from the message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,24.70.174.122,51.65.195.233,12.252.112.94,51.65.195.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:30 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62861 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 24.70.174.122 serverIP: 51.65.195.233
Explain this syslog message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:31", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62870, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "223.24.194.64", "serverIP": "186.56.219.233" }
Create a JSON artifact from the message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,223.24.194.64,186.56.219.233,12.252.112.94,186.56.219.233,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:31 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62870 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 223.24.194.64 serverIP: 186.56.219.233
Explain this syslog message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:31", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62870, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "234.56.206.34", "serverIP": "53.91.27.57" }
Create a JSON artifact from the message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,234.56.206.34,53.91.27.57,12.252.112.94,53.91.27.57,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:31 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62870 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 234.56.206.34 serverIP: 53.91.27.57
Explain this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
{ "rulename": "IT Users Outbound", "senderhost": "10.87.7.11", "serverport": 443, "severitylabel": "informational", "tags": [ "(9999)", "rfc3164", "pan_firewall", "firewall_log", "CPB-BH-PA220", "google-base" ], "productids": [ 20, 0 ], "rulecategory": "unknown", "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,", "action": "block", "localstarttime": "2022/08/09 11:10:30", "sensitivity": "normal", "localhostname": "CPB-BH-PA220", "priority": 14, "facilitylabel": "user-level", "messagetype": "firewall_log", "clientport": 62861, "protocol": 6, "facilitycode": 1, "streamName": "pan_firewall", "clientIP": "180.151.22.30", "serverIP": "195.134.179.239" }
Create a JSON artifact from the message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,180.151.22.30,195.134.179.239,12.252.112.94,195.134.179.239,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: IT Users Outbound senderhost: 10.87.7.11 serverport: 443 severitylabel: informational tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base'] productids: [20, 0] rulecategory: unknown severitycode: 6 sourceinfo: unknown action: block localstarttime: 2022/08/09 11:10:30 sensitivity: normal localhostname: CPB-BH-PA220 priority: 14 facilitylabel: user-level messagetype: firewall_log clientport: 62861 protocol: 6 facilitycode: 1 streamName: pan_firewall clientIP: 180.151.22.30 serverIP: 195.134.179.239
Explain this syslog message