input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.244.62.74,145.143.251.242,12.252.112.94,145.143.251.242,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.244.62.74,145.143.251.242,12.252.112.94,145.143.251.242,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:30",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62861,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "122.244.62.74",
"serverIP": "145.143.251.242"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.244.62.74,145.143.251.242,12.252.112.94,145.143.251.242,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:31 CPB-BH-PA220 1,2022/08/09 11:10:30,012801150189,THREAT,url,2560,2022/08/09 11:10:30,122.244.62.74,145.143.251.242,12.252.112.94,145.143.251.242,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:30,29046,1,62861,443,64641,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078465,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:31.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:30
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62861
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 122.244.62.74
serverIP: 145.143.251.242
|
Explain this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,225.236.253.146,52.168.139.66,12.252.112.94,52.168.139.66,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,225.236.253.146,52.168.139.66,12.252.112.94,52.168.139.66,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:31",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62870,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "225.236.253.146",
"serverIP": "52.168.139.66"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,225.236.253.146,52.168.139.66,12.252.112.94,52.168.139.66,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,225.236.253.146,52.168.139.66,12.252.112.94,52.168.139.66,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:31
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62870
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 225.236.253.146
serverIP: 52.168.139.66
|
Explain this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,92.135.160.118,68.191.247.241,12.252.112.94,68.191.247.241,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.7.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-BH-PA220",
"google-base"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,92.135.160.118,68.191.247.241,12.252.112.94,68.191.247.241,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,\"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/\",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:31",
"sensitivity": "normal",
"localhostname": "CPB-BH-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 62870,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "92.135.160.118",
"serverIP": "68.191.247.241"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,92.135.160.118,68.191.247.241,12.252.112.94,68.191.247.241,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:32 CPB-BH-PA220 1,2022/08/09 11:10:31,012801150189,THREAT,url,2560,2022/08/09 11:10:31,92.135.160.118,68.191.247.241,12.252.112.94,68.191.247.241,IT Users Outbound,,,google-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:31,25365,1,62870,443,2836,443,0x403400,tcp,block-url,"e1cbc099a250449abb8b75a576552737.safeframe.googlesyndication.com/",(9999),web-advertisements,informational,client-to-server,64078471,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,53,0,0,,CPB-BH-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:32.233-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.7.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-BH-PA220', 'google-base']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:31
sensitivity: normal
localhostname: CPB-BH-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 62870
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 92.135.160.118
serverIP: 68.191.247.241
|
Explain this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,68.41.82.188,60.91.21.0,38.88.220.178,60.91.21.0,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),oscorpial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"tiktok",
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,68.41.82.188,60.91.21.0,38.88.220.178,60.91.21.0,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,\"analytics.tiktok.com/\",(9999),oscorpial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"oscorpial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:47",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56108,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "68.41.82.188",
"serverIP": "60.91.21.0"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,68.41.82.188,60.91.21.0,38.88.220.178,60.91.21.0,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),oscorpial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,68.41.82.188,60.91.21.0,38.88.220.178,60.91.21.0,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),oscorpial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['tiktok', '(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:47
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56108
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 68.41.82.188
serverIP: 60.91.21.0
|
Explain this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,224.7.31.203,217.22.117.246,38.88.220.178,217.22.117.246,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),umbrellaial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"tiktok",
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,224.7.31.203,217.22.117.246,38.88.220.178,217.22.117.246,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,\"analytics.tiktok.com/\",(9999),umbrellaial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"umbrellaial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:47",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56108,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "224.7.31.203",
"serverIP": "217.22.117.246"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,224.7.31.203,217.22.117.246,38.88.220.178,217.22.117.246,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),umbrellaial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,224.7.31.203,217.22.117.246,38.88.220.178,217.22.117.246,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),umbrellaial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"umbrellaial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['tiktok', '(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:47
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56108
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 224.7.31.203
serverIP: 217.22.117.246
|
Explain this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,203.131.122.88,62.86.186.213,38.88.220.178,62.86.186.213,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"tiktok",
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,203.131.122.88,62.86.186.213,38.88.220.178,62.86.186.213,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,\"analytics.tiktok.com/\",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"wayneial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:47",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56108,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "203.131.122.88",
"serverIP": "62.86.186.213"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,203.131.122.88,62.86.186.213,38.88.220.178,62.86.186.213,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,203.131.122.88,62.86.186.213,38.88.220.178,62.86.186.213,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['tiktok', '(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:47
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56108
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 203.131.122.88
serverIP: 62.86.186.213
|
Explain this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,244.15.76.226,41.84.196.248,38.88.220.178,41.84.196.248,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"tiktok",
"(9999)",
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,244.15.76.226,41.84.196.248,38.88.220.178,41.84.196.248,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,\"analytics.tiktok.com/\",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"wayneial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:47",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56108,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "244.15.76.226",
"serverIP": "41.84.196.248"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,244.15.76.226,41.84.196.248,38.88.220.178,41.84.196.248,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:47 CPB-SD-PA220 1,2022/08/09 11:09:47,012801150092,THREAT,url,2560,2022/08/09 11:09:47,244.15.76.226,41.84.196.248,38.88.220.178,41.84.196.248,IT Users Outbound,,,tiktok,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:47,40871,1,56108,443,18589,443,0x403400,tcp,block-url,"analytics.tiktok.com/",(9999),wayneial-networking,informational,client-to-server,35757911,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"wayneial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:47.836-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['tiktok', '(9999)', 'rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:47
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56108
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 244.15.76.226
serverIP: 41.84.196.248
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,208.111.170.27,118.117.123.152,70.183.89.110,118.117.123.152,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,208.111.170.27,118.117.123.152,70.183.89.110,118.117.123.152,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56154,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "208.111.170.27",
"serverIP": "118.117.123.152"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,208.111.170.27,118.117.123.152,70.183.89.110,118.117.123.152,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,208.111.170.27,118.117.123.152,70.183.89.110,118.117.123.152,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56154
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 208.111.170.27
serverIP: 118.117.123.152
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,230.236.249.21,75.228.79.25,70.183.89.110,75.228.79.25,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,230.236.249.21,75.228.79.25,70.183.89.110,75.228.79.25,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56154,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "230.236.249.21",
"serverIP": "75.228.79.25"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,230.236.249.21,75.228.79.25,70.183.89.110,75.228.79.25,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,230.236.249.21,75.228.79.25,70.183.89.110,75.228.79.25,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56154
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 230.236.249.21
serverIP: 75.228.79.25
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,191.39.214.34,166.6.127.19,70.183.89.110,166.6.127.19,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),acmeial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"acmeial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"CPB-SD-PA220",
"facebook-base",
"firewall_log"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,191.39.214.34,166.6.127.19,70.183.89.110,166.6.127.19,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),acmeial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"acmeial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56152,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "191.39.214.34",
"serverIP": "166.6.127.19"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,191.39.214.34,166.6.127.19,70.183.89.110,166.6.127.19,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),acmeial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"acmeial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,191.39.214.34,166.6.127.19,70.183.89.110,166.6.127.19,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),acmeial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"acmeial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-SD-PA220', 'facebook-base', 'firewall_log']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56152
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 191.39.214.34
serverIP: 166.6.127.19
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,19.86.36.214,134.153.121.54,70.183.89.110,134.153.121.54,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"(9999)",
"rfc3164",
"pan_firewall",
"CPB-SD-PA220",
"facebook-base",
"firewall_log"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,19.86.36.214,134.153.121.54,70.183.89.110,134.153.121.54,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,\"connect.facebook.net/\",(9999),oscorpial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"oscorpial-networking,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56152,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "19.86.36.214",
"serverIP": "134.153.121.54"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,19.86.36.214,134.153.121.54,70.183.89.110,134.153.121.54,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,19.86.36.214,134.153.121.54,70.183.89.110,134.153.121.54,IT Users Outbound,,,facebook-base,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,42832,1,56152,443,2823,443,0x403400,tcp,block-url,"connect.facebook.net/",(9999),oscorpial-networking,informational,client-to-server,35757965,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"oscorpial-networking,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.358-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['(9999)', 'rfc3164', 'pan_firewall', 'CPB-SD-PA220', 'facebook-base', 'firewall_log']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56152
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 19.86.36.214
serverIP: 134.153.121.54
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,91.169.251.106,193.203.21.51,38.88.220.178,193.203.21.51,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,91.169.251.106,193.203.21.51,38.88.220.178,193.203.21.51,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56151,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "91.169.251.106",
"serverIP": "193.203.21.51"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,91.169.251.106,193.203.21.51,38.88.220.178,193.203.21.51,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,91.169.251.106,193.203.21.51,38.88.220.178,193.203.21.51,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56151
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 91.169.251.106
serverIP: 193.203.21.51
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,108.115.123.60,134.181.14.227,38.88.220.178,134.181.14.227,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,108.115.123.60,134.181.14.227,38.88.220.178,134.181.14.227,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56151,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "108.115.123.60",
"serverIP": "134.181.14.227"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,108.115.123.60,134.181.14.227,38.88.220.178,134.181.14.227,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,108.115.123.60,134.181.14.227,38.88.220.178,134.181.14.227,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56151
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 108.115.123.60
serverIP: 134.181.14.227
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,151.176.170.251,65.39.215.22,70.183.89.110,65.39.215.22,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,151.176.170.251,65.39.215.22,70.183.89.110,65.39.215.22,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56154,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "151.176.170.251",
"serverIP": "65.39.215.22"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,151.176.170.251,65.39.215.22,70.183.89.110,65.39.215.22,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,151.176.170.251,65.39.215.22,70.183.89.110,65.39.215.22,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56154
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 151.176.170.251
serverIP: 65.39.215.22
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,124.130.99.181,84.73.252.195,70.183.89.110,84.73.252.195,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,124.130.99.181,84.73.252.195,70.183.89.110,84.73.252.195,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56154,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "124.130.99.181",
"serverIP": "84.73.252.195"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,124.130.99.181,84.73.252.195,70.183.89.110,84.73.252.195,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,124.130.99.181,84.73.252.195,70.183.89.110,84.73.252.195,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,38226,1,56154,443,20451,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757968,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56154
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 124.130.99.181
serverIP: 84.73.252.195
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,245.159.150.239,30.41.120.220,38.88.220.178,30.41.120.220,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,245.159.150.239,30.41.120.220,38.88.220.178,30.41.120.220,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56151,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "245.159.150.239",
"serverIP": "30.41.120.220"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,245.159.150.239,30.41.120.220,38.88.220.178,30.41.120.220,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,245.159.150.239,30.41.120.220,38.88.220.178,30.41.120.220,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56151
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 245.159.150.239
serverIP: 30.41.120.220
|
Explain this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,165.15.46.30,53.124.150.161,38.88.220.178,53.124.150.161,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,165.15.46.30,53.124.150.161,38.88.220.178,53.124.150.161,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,\"s.amazon-adsystem.com/\",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:08",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56151,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "165.15.46.30",
"serverIP": "53.124.150.161"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,165.15.46.30,53.124.150.161,38.88.220.178,53.124.150.161,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:09 CPB-SD-PA220 1,2022/08/09 11:10:08,012801150092,THREAT,url,2560,2022/08/09 11:10:08,165.15.46.30,53.124.150.161,38.88.220.178,53.124.150.161,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:08,166,1,56151,443,21335,443,0x403400,tcp,block-url,"s.amazon-adsystem.com/",(9999),web-advertisements,informational,client-to-server,35757967,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:09.359-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:08
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56151
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 165.15.46.30
serverIP: 53.124.150.161
|
Explain this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,154.8.233.241,219.121.193.5,70.183.89.110,219.121.193.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,154.8.233.241,219.121.193.5,70.183.89.110,219.121.193.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,\"ads.cordlessmedia.com/\",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:09",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56159,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "154.8.233.241",
"serverIP": "219.121.193.5"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,154.8.233.241,219.121.193.5,70.183.89.110,219.121.193.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,154.8.233.241,219.121.193.5,70.183.89.110,219.121.193.5,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:09
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56159
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 154.8.233.241
serverIP: 219.121.193.5
|
Explain this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,20.200.37.225,212.229.71.147,70.183.89.110,212.229.71.147,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,20.200.37.225,212.229.71.147,70.183.89.110,212.229.71.147,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,\"ads.cordlessmedia.com/\",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:09",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56159,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "20.200.37.225",
"serverIP": "212.229.71.147"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,20.200.37.225,212.229.71.147,70.183.89.110,212.229.71.147,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,20.200.37.225,212.229.71.147,70.183.89.110,212.229.71.147,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:09
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56159
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 20.200.37.225
serverIP: 212.229.71.147
|
Explain this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,174.133.72.109,226.221.189.184,70.183.89.110,226.221.189.184,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,174.133.72.109,226.221.189.184,70.183.89.110,226.221.189.184,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,\"ads.cordlessmedia.com/\",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:09",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56159,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "174.133.72.109",
"serverIP": "226.221.189.184"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,174.133.72.109,226.221.189.184,70.183.89.110,226.221.189.184,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,174.133.72.109,226.221.189.184,70.183.89.110,226.221.189.184,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:09
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56159
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 174.133.72.109
serverIP: 226.221.189.184
|
Explain this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,240.169.205.115,238.33.248.141,70.183.89.110,238.33.248.141,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.5.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"firewall_log",
"CPB-SD-PA220",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,240.169.205.115,238.33.248.141,70.183.89.110,238.33.248.141,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,\"ads.cordlessmedia.com/\",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:10:09",
"sensitivity": "normal",
"localhostname": "CPB-SD-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 56159,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "240.169.205.115",
"serverIP": "238.33.248.141"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,240.169.205.115,238.33.248.141,70.183.89.110,238.33.248.141,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:10:10 CPB-SD-PA220 1,2022/08/09 11:10:09,012801150092,THREAT,url,2560,2022/08/09 11:10:09,240.169.205.115,238.33.248.141,70.183.89.110,238.33.248.141,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:10:09,48796,1,56159,443,24427,443,0x403400,tcp,block-url,"ads.cordlessmedia.com/",(9999),web-advertisements,informational,client-to-server,35757973,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,137,0,0,,CPB-SD-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:10:10.491-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.5.11
serverport: 443
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'firewall_log', 'CPB-SD-PA220', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:10:09
sensitivity: normal
localhostname: CPB-SD-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 56159
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 240.169.205.115
serverIP: 238.33.248.141
|
Explain this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,1.195.22.51,0.170.244.172,184.185.112.150,0.170.244.172,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.11.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"CPB-MV-PA220",
"rfc3164",
"pan_firewall",
"firewall_log",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,1.195.22.51,0.170.244.172,184.185.112.150,0.170.244.172,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,\"beap.gemini.yahoo.com/\",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:35",
"sensitivity": "normal",
"localhostname": "CPB-MV-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 55566,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "1.195.22.51",
"serverIP": "0.170.244.172"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,1.195.22.51,0.170.244.172,184.185.112.150,0.170.244.172,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,1.195.22.51,0.170.244.172,184.185.112.150,0.170.244.172,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.11.11
serverport: 443
severitylabel: informational
tags: ['CPB-MV-PA220', 'rfc3164', 'pan_firewall', 'firewall_log', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:35
sensitivity: normal
localhostname: CPB-MV-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 55566
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 1.195.22.51
serverIP: 0.170.244.172
|
Explain this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,145.46.249.144,41.84.38.68,184.185.112.150,41.84.38.68,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.11.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"CPB-MV-PA220",
"rfc3164",
"pan_firewall",
"firewall_log",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,145.46.249.144,41.84.38.68,184.185.112.150,41.84.38.68,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,\"beap.gemini.yahoo.com/\",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:35",
"sensitivity": "normal",
"localhostname": "CPB-MV-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 55566,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "145.46.249.144",
"serverIP": "41.84.38.68"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,145.46.249.144,41.84.38.68,184.185.112.150,41.84.38.68,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,145.46.249.144,41.84.38.68,184.185.112.150,41.84.38.68,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.11.11
serverport: 443
severitylabel: informational
tags: ['CPB-MV-PA220', 'rfc3164', 'pan_firewall', 'firewall_log', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:35
sensitivity: normal
localhostname: CPB-MV-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 55566
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 145.46.249.144
serverIP: 41.84.38.68
|
Explain this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,62.111.77.240,36.103.219.196,184.185.112.150,36.103.219.196,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.11.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"CPB-MV-PA220",
"rfc3164",
"pan_firewall",
"firewall_log",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,62.111.77.240,36.103.219.196,184.185.112.150,36.103.219.196,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,\"beap.gemini.yahoo.com/\",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:35",
"sensitivity": "normal",
"localhostname": "CPB-MV-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 55566,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "62.111.77.240",
"serverIP": "36.103.219.196"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,62.111.77.240,36.103.219.196,184.185.112.150,36.103.219.196,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,62.111.77.240,36.103.219.196,184.185.112.150,36.103.219.196,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.11.11
serverport: 443
severitylabel: informational
tags: ['CPB-MV-PA220', 'rfc3164', 'pan_firewall', 'firewall_log', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:35
sensitivity: normal
localhostname: CPB-MV-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 55566
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 62.111.77.240
serverIP: 36.103.219.196
|
Explain this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,119.164.99.27,99.225.71.15,184.185.112.150,99.225.71.15,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
{
"rulename": "IT Users Outbound",
"senderhost": "10.87.11.11",
"serverport": 443,
"severitylabel": "informational",
"tags": [
"CPB-MV-PA220",
"rfc3164",
"pan_firewall",
"firewall_log",
"(9999)",
"ssl"
],
"productids": [
20,
0
],
"rulecategory": "unknown",
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,119.164.99.27,99.225.71.15,184.185.112.150,99.225.71.15,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,\"beap.gemini.yahoo.com/\",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,\"web-advertisements,low-risk\",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,",
"action": "block",
"localstarttime": "2022/08/09 11:09:35",
"sensitivity": "normal",
"localhostname": "CPB-MV-PA220",
"priority": 14,
"facilitylabel": "user-level",
"messagetype": "firewall_log",
"clientport": 55566,
"protocol": 6,
"facilitycode": 1,
"streamName": "pan_firewall",
"clientIP": "119.164.99.27",
"serverIP": "99.225.71.15"
}
|
Create a JSON artifact from the message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,119.164.99.27,99.225.71.15,184.185.112.150,99.225.71.15,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 9 11:09:35 CPB-MV-PA220 1,2022/08/09 11:09:35,012801149812,THREAT,url,2560,2022/08/09 11:09:35,119.164.99.27,99.225.71.15,184.185.112.150,99.225.71.15,IT Users Outbound,,,ssl,vsys1,L3 Trust,L3 Untrust,ethernet1/1,sdwan.901,ForwardToPanorama,2022/08/09 11:09:35,33929,1,55566,443,18864,443,0x403400,tcp,block-url,"beap.gemini.yahoo.com/",(9999),web-advertisements,informational,client-to-server,31001478,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,0,,,,,,,,0,27,109,0,0,,CPB-MV-PA220,,,,,0,,0,,N/A,unknown,AppThreat-0-0,0x0,0,4294967295,,"web-advertisements,low-risk",065bc8bd-1c6f-4c23-9eb0-21f59a597833,0,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2022-08-09T11:09:35.801-07:00,,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: IT Users Outbound
senderhost: 10.87.11.11
serverport: 443
severitylabel: informational
tags: ['CPB-MV-PA220', 'rfc3164', 'pan_firewall', 'firewall_log', '(9999)', 'ssl']
productids: [20, 0]
rulecategory: unknown
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: 2022/08/09 11:09:35
sensitivity: normal
localhostname: CPB-MV-PA220
priority: 14
facilitylabel: user-level
messagetype: firewall_log
clientport: 55566
protocol: 6
facilitycode: 1
streamName: pan_firewall
clientIP: 119.164.99.27
serverIP: 99.225.71.15
|
Explain this syslog message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,224.88.127.207,242.46.157.173,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51260,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:02:02",
"message": "<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,224.88.127.207,242.46.157.173,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5900,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "224.88.127.207",
"serverIP": "242.46.157.173"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,224.88.127.207,242.46.157.173,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,224.88.127.207,242.46.157.173,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51260
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:02:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5900
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 224.88.127.207
serverIP: 242.46.157.173
|
Explain this syslog message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,108.84.202.246,165.56.70.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 51260,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:02:02",
"message": "<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,108.84.202.246,165.56.70.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5900,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "108.84.202.246",
"serverIP": "165.56.70.80"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,108.84.202.246,165.56.70.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:02:02 DC1-PA3220-1 1,2023/07/31 05:02:02,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:02,108.84.202.246,165.56.70.80,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:02:02,0,1,51260,5900,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:00,0,any,,7250965734469125799,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:02.785-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 51260
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:02:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5900
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 108.84.202.246
serverIP: 165.56.70.80
|
Explain this syslog message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,114.196.229.34,239.131.116.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 5846,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:07:03",
"message": "<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,114.196.229.34,239.131.116.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "114.196.229.34",
"serverIP": "239.131.116.248"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,114.196.229.34,239.131.116.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,114.196.229.34,239.131.116.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 5846
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:07:03
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 114.196.229.34
serverIP: 239.131.116.248
|
Explain this syslog message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,45.119.200.178,18.168.5.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 5846,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:07:03",
"message": "<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,45.119.200.178,18.168.5.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "45.119.200.178",
"serverIP": "18.168.5.67"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,45.119.200.178,18.168.5.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:07:03 DC1-PA3220-1 1,2023/07/31 05:07:03,016201032964,TRAFFIC,drop,2561,2023/07/31 05:07:03,45.119.200.178,18.168.5.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:07:03,0,1,5846,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:07:01,0,any,,7250965734469153205,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:07:03.907-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 5846
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:07:03
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 45.119.200.178
serverIP: 18.168.5.67
|
Explain this syslog message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,193.133.199.88,47.169.87.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:02:39",
"message": "<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,193.133.199.88,47.169.87.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8085,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "193.133.199.88",
"serverIP": "47.169.87.99"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,193.133.199.88,47.169.87.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,193.133.199.88,47.169.87.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:02:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8085
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 193.133.199.88
serverIP: 47.169.87.99
|
Explain this syslog message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,164.197.18.79,241.125.122.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:02:39",
"message": "<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,164.197.18.79,241.125.122.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8085,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "164.197.18.79",
"serverIP": "241.125.122.229"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,164.197.18.79,241.125.122.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:02:39 DC1-PA3220-1 1,2023/07/31 05:02:39,016201032964,TRAFFIC,drop,2561,2023/07/31 05:02:39,164.197.18.79,241.125.122.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:02:39,0,1,58914,8085,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:02:37,0,any,,7250965734469129242,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:02:39.397-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:02:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8085
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 164.197.18.79
serverIP: 241.125.122.229
|
Explain this syslog message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,242.250.145.10,216.156.72.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 30919,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:03:33",
"message": "<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,242.250.145.10,216.156.72.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "242.250.145.10",
"serverIP": "216.156.72.16"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,242.250.145.10,216.156.72.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,242.250.145.10,216.156.72.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 30919
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:03:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 242.250.145.10
serverIP: 216.156.72.16
|
Explain this syslog message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,150.177.217.109,137.15.207.222,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 30919,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:03:33",
"message": "<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,150.177.217.109,137.15.207.222,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "150.177.217.109",
"serverIP": "137.15.207.222"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,150.177.217.109,137.15.207.222,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:03:33 DC1-PA3220-1 1,2023/07/31 05:03:33,016201032964,TRAFFIC,drop,2561,2023/07/31 05:03:33,150.177.217.109,137.15.207.222,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:03:33,0,1,30919,445,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:03:31,0,any,,7250965734469133900,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:03:33.486-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 30919
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:03:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 150.177.217.109
serverIP: 137.15.207.222
|
Explain this syslog message
|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,9.61.200.168,225.253.46.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59760,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:01:21",
"message": "<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,9.61.200.168,225.253.46.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "9.61.200.168",
"serverIP": "225.253.46.230"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.