input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,9.61.200.168,225.253.46.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,9.61.200.168,225.253.46.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59760
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:01:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 9.61.200.168
serverIP: 225.253.46.230
|
Explain this syslog message
|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,227.129.18.92,208.132.215.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59760,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:01:21",
"message": "<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,227.129.18.92,208.132.215.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "227.129.18.92",
"serverIP": "208.132.215.84"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,227.129.18.92,208.132.215.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:01:21 DC1-PA3220-1 1,2023/07/31 05:01:21,016201032964,TRAFFIC,drop,2561,2023/07/31 05:01:21,227.129.18.92,208.132.215.84,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:01:21,0,1,59760,443,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:01:19,0,any,,7250965734469122197,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:01:21.826-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59760
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:01:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 227.129.18.92
serverIP: 208.132.215.84
|
Explain this syslog message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,209.81.174.71,125.8.145.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 57304,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:04:08",
"message": "<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,209.81.174.71,125.8.145.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "209.81.174.71",
"serverIP": "125.8.145.102"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,209.81.174.71,125.8.145.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,209.81.174.71,125.8.145.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 57304
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:04:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 209.81.174.71
serverIP: 125.8.145.102
|
Explain this syslog message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,147.41.126.151,207.21.125.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 57304,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:04:08",
"message": "<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,147.41.126.151,207.21.125.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "147.41.126.151",
"serverIP": "207.21.125.178"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,147.41.126.151,207.21.125.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:04:08 DC1-PA3220-1 1,2023/07/31 05:04:08,016201032964,TRAFFIC,drop,2561,2023/07/31 05:04:08,147.41.126.151,207.21.125.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:04:08,0,1,57304,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:04:06,0,any,,7250965734469136851,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:04:08.787-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 57304
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:04:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 147.41.126.151
serverIP: 207.21.125.178
|
Explain this syslog message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,211.205.234.184,245.185.46.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54347,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:06:25",
"message": "<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,211.205.234.184,245.185.46.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43469,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "245.185.46.15",
"serverIP": "211.205.234.184"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,211.205.234.184,245.185.46.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,211.205.234.184,245.185.46.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54347
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:06:25
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43469
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 245.185.46.15
serverIP: 211.205.234.184
|
Explain this syslog message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,17.37.174.245,71.34.78.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54347,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:06:25",
"message": "<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,17.37.174.245,71.34.78.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43469,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "71.34.78.85",
"serverIP": "17.37.174.245"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,17.37.174.245,71.34.78.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:06:25 DC1-PA3220-1 1,2023/07/31 05:06:25,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:25,17.37.174.245,71.34.78.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:25,0,1,43469,54347,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:23,0,any,,7250965734469149726,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:25.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54347
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:06:25
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43469
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 71.34.78.85
serverIP: 17.37.174.245
|
Explain this syslog message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,125.58.235.156,5.63.245.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46016,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:06:38",
"message": "<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,125.58.235.156,5.63.245.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "125.58.235.156",
"serverIP": "5.63.245.106"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,125.58.235.156,5.63.245.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,125.58.235.156,5.63.245.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46016
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:06:38
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 125.58.235.156
serverIP: 5.63.245.106
|
Explain this syslog message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,11.35.51.10,70.37.226.244,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 46016,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:06:38",
"message": "<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,11.35.51.10,70.37.226.244,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "11.35.51.10",
"serverIP": "70.37.226.244"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,11.35.51.10,70.37.226.244,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:06:38 DC1-PA3220-1 1,2023/07/31 05:06:38,016201032964,TRAFFIC,drop,2561,2023/07/31 05:06:38,11.35.51.10,70.37.226.244,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:06:38,0,1,46016,22,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:06:36,0,any,,7250965734469150924,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:06:38.793-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 46016
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:06:38
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 11.35.51.10
serverIP: 70.37.226.244
|
Explain this syslog message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,101.214.84.42,146.222.161.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 59300,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:08:06",
"message": "<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,101.214.84.42,146.222.161.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 55863,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "146.222.161.16",
"serverIP": "101.214.84.42"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,101.214.84.42,146.222.161.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,101.214.84.42,146.222.161.16,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 59300
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:08:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 55863
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 146.222.161.16
serverIP: 101.214.84.42
|
Explain this syslog message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,209.58.214.104,33.225.231.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 59300,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:08:06",
"message": "<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,209.58.214.104,33.225.231.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 55863,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "33.225.231.44",
"serverIP": "209.58.214.104"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,209.58.214.104,33.225.231.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:08:06 DC1-PA3220-1 1,2023/07/31 05:08:06,016201032964,TRAFFIC,drop,2561,2023/07/31 05:08:06,209.58.214.104,33.225.231.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:08:06,0,1,55863,59300,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:08:04,0,any,,7250965734469159595,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:08:06.808-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 59300
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:08:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 55863
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 33.225.231.44
serverIP: 209.58.214.104
|
Explain this syslog message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,192.33.52.191,160.189.191.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 37237,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:09:27",
"message": "<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,192.33.52.191,160.189.191.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "192.33.52.191",
"serverIP": "160.189.191.119"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,192.33.52.191,160.189.191.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,192.33.52.191,160.189.191.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 37237
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:09:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 192.33.52.191
serverIP: 160.189.191.119
|
Explain this syslog message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,137.103.193.22,195.25.20.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 37237,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:09:27",
"message": "<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,137.103.193.22,195.25.20.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "137.103.193.22",
"serverIP": "195.25.20.65"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,137.103.193.22,195.25.20.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:09:27 DC1-PA3220-1 1,2023/07/31 05:09:27,016201032964,TRAFFIC,drop,2561,2023/07/31 05:09:27,137.103.193.22,195.25.20.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:09:27,0,1,37237,23,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:09:26,0,any,,7250965734469168464,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:09:27.908-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 37237
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:09:27
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 137.103.193.22
serverIP: 195.25.20.65
|
Explain this syslog message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,147.95.183.204,164.105.61.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65518,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:12:13",
"message": "<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,147.95.183.204,164.105.61.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43608,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "164.105.61.170",
"serverIP": "147.95.183.204"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,147.95.183.204,164.105.61.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,147.95.183.204,164.105.61.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65518
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:12:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43608
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 164.105.61.170
serverIP: 147.95.183.204
|
Explain this syslog message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,73.48.179.146,233.104.5.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65518,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:12:13",
"message": "<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,73.48.179.146,233.104.5.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43608,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "233.104.5.63",
"serverIP": "73.48.179.146"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,73.48.179.146,233.104.5.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:12:13 DC1-PA3220-1 1,2023/07/31 05:12:12,016201032964,TRAFFIC,drop,2561,2023/07/31 05:12:12,73.48.179.146,233.104.5.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:12:12,0,1,43608,65518,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:12:10,0,any,,7250965734469183308,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:12:13.291-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65518
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:12:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43608
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 233.104.5.63
serverIP: 73.48.179.146
|
Explain this syslog message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,161.48.197.64,24.140.57.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 56578,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:42",
"message": "<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,161.48.197.64,24.140.57.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8152,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "161.48.197.64",
"serverIP": "24.140.57.65"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,161.48.197.64,24.140.57.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,161.48.197.64,24.140.57.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 56578
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:42
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8152
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 161.48.197.64
serverIP: 24.140.57.65
|
Explain this syslog message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,56.154.116.4,65.72.237.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 56578,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:42",
"message": "<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,56.154.116.4,65.72.237.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8152,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "56.154.116.4",
"serverIP": "65.72.237.174"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,56.154.116.4,65.72.237.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:42 DC1-PA3220-1 1,2023/07/31 05:11:42,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:42,56.154.116.4,65.72.237.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:42,0,1,56578,8152,0,0,0x0,tcp,deny,66,66,0,1,2023/07/31 05:11:41,0,any,,7250965734469180435,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:42.991-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 56578
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:42
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8152
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 56.154.116.4
serverIP: 65.72.237.174
|
Explain this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,116.37.34.104,219.86.10.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65100,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:22",
"message": "<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,116.37.34.104,219.86.10.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 67,
"serverpackets": 1,
"serverport": 2101,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "219.86.10.30",
"serverIP": "116.37.34.104"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,116.37.34.104,219.86.10.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,116.37.34.104,219.86.10.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65100
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:22
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 67
serverpackets: 1
serverport: 2101
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 219.86.10.30
serverIP: 116.37.34.104
|
Explain this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,39.83.9.234,28.11.60.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65100,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:22",
"message": "<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,39.83.9.234,28.11.60.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 67,
"serverpackets": 1,
"serverport": 2101,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "28.11.60.160",
"serverIP": "39.83.9.234"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,39.83.9.234,28.11.60.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,39.83.9.234,28.11.60.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65100
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:22
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 67
serverpackets: 1
serverport: 2101
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 28.11.60.160
serverIP: 39.83.9.234
|
Explain this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,166.75.117.104,83.148.116.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65100,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:22",
"message": "<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,166.75.117.104,83.148.116.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 67,
"serverpackets": 1,
"serverport": 2101,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 67,
"streamName": "pan_firewall",
"clientIP": "83.148.116.42",
"serverIP": "166.75.117.104"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,166.75.117.104,83.148.116.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:22 DC1-PA3220-1 1,2023/07/31 05:11:22,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:22,166.75.117.104,83.148.116.42,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:11:22,0,1,2101,65100,0,0,0x0,udp,deny,67,67,0,1,2023/07/31 05:11:20,0,any,,7250965734469178757,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:22.910-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65100
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:22
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 67
serverpackets: 1
serverport: 2101
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 67
streamName: pan_firewall
clientIP: 83.148.116.42
serverIP: 166.75.117.104
|
Explain this syslog message
|
<14>Jul 31 05:11:16 DC1-PA3220-1 1,2023/07/31 05:11:16,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:16,58.116.86.232,4.145.225.196,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:16,0,1,45176,9031,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:11:14,0,any,,7250965734469178270,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:16.790-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45176,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:11:16",
"message": "<14>Jul 31 05:11:16 DC1-PA3220-1 1,2023/07/31 05:11:16,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:16,58.116.86.232,4.145.225.196,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:16,0,1,45176,9031,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:11:14,0,any,,7250965734469178270,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:16.790-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 9031,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "58.116.86.232",
"serverIP": "4.145.225.196"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:11:16 DC1-PA3220-1 1,2023/07/31 05:11:16,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:16,58.116.86.232,4.145.225.196,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:16,0,1,45176,9031,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:11:14,0,any,,7250965734469178270,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:16.790-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:11:16 DC1-PA3220-1 1,2023/07/31 05:11:16,016201032964,TRAFFIC,drop,2561,2023/07/31 05:11:16,58.116.86.232,4.145.225.196,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/07/31 05:11:16,0,1,45176,9031,0,0,0x0,tcp,deny,60,60,0,1,2023/07/31 05:11:14,0,any,,7250965734469178270,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:11:16.790-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45176
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:11:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 9031
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 58.116.86.232
serverIP: 4.145.225.196
|
Explain this syslog message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,96.176.79.236,161.164.201.136,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 10256,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:19:36",
"message": "<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,96.176.79.236,161.164.201.136,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "96.176.79.236",
"serverIP": "161.164.201.136"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,96.176.79.236,161.164.201.136,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,96.176.79.236,161.164.201.136,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 10256
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:19:36
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 96.176.79.236
serverIP: 161.164.201.136
|
Explain this syslog message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,146.181.120.154,81.98.37.204,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 10256,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jul 31 05:19:36",
"message": "<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,146.181.120.154,81.98.37.204,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "146.181.120.154",
"serverIP": "81.98.37.204"
}
|
Create a JSON artifact from the message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,146.181.120.154,81.98.37.204,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jul 31 05:19:36 DC1-PA3220-1 1,2023/07/31 05:19:36,016201032964,TRAFFIC,drop,2561,2023/07/31 05:19:36,146.181.120.154,81.98.37.204,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/07/31 05:19:36,0,1,10256,443,0,0,0x0,udp,deny,60,60,0,1,2023/07/31 05:19:34,0,any,,7250965734469221738,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-07-31T05:19:36.836-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 10256
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jul 31 05:19:36
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 146.181.120.154
serverIP: 81.98.37.204
|
Explain this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,238.115.184.237,187.33.46.177,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,238.115.184.237,187.33.46.177,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:02",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 43673,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "238.115.184.237",
"serverIP": "187.33.46.177"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,238.115.184.237,187.33.46.177,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,238.115.184.237,187.33.46.177,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:02
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 43673
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 238.115.184.237
serverIP: 187.33.46.177
|
Explain this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,236.168.221.66,102.60.31.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,236.168.221.66,102.60.31.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:02",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 43673,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "236.168.221.66",
"serverIP": "102.60.31.36"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,236.168.221.66,102.60.31.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,236.168.221.66,102.60.31.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:02
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 43673
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 236.168.221.66
serverIP: 102.60.31.36
|
Explain this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,45.114.177.83,227.198.186.55,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,45.114.177.83,227.198.186.55,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:02",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 43673,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "45.114.177.83",
"serverIP": "227.198.186.55"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,45.114.177.83,227.198.186.55,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,45.114.177.83,227.198.186.55,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:02
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 43673
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 45.114.177.83
serverIP: 227.198.186.55
|
Explain this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,79.225.148.25,255.213.4.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,79.225.148.25,255.213.4.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:02",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 43673,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "79.225.148.25",
"serverIP": "255.213.4.44"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,79.225.148.25,255.213.4.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:02 DC1-PA3220-1 1,2023/04/12 00:34:01,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:01,79.225.148.25,255.213.4.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:01,0,1,43673,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:01,0,any,0,4973383623,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:02.335-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:02
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 43673
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 79.225.148.25
serverIP: 255.213.4.44
|
Explain this syslog message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,134.252.109.82,115.75.96.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 5550,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,134.252.109.82,115.75.96.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:31",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 48255,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "134.252.109.82",
"serverIP": "115.75.96.227"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,134.252.109.82,115.75.96.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,134.252.109.82,115.75.96.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 5550
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:31
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 48255
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 134.252.109.82
serverIP: 115.75.96.227
|
Explain this syslog message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,63.117.214.183,170.15.59.231,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 5550,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,63.117.214.183,170.15.59.231,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,",
"action": "block",
"localstarttime": "Apr 12 00:34:31",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 48255,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "63.117.214.183",
"serverIP": "170.15.59.231"
}
|
Create a JSON artifact from the message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,63.117.214.183,170.15.59.231,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 12 00:34:31 DC1-PA3220-1 1,2023/04/12 00:34:30,016201032964,TRAFFIC,drop,2560,2023/04/12 00:34:30,63.117.214.183,170.15.59.231,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/12 00:34:30,0,1,48255,5550,0,0,0x0,tcp,deny,60,60,0,1,2023/04/12 00:34:30,0,any,0,4973386149,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-12T00:34:31.341-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 5550
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 12 00:34:31
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 48255
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 63.117.214.183
serverIP: 170.15.59.231
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=217.217.127.81 dst=88.116.81.183 protocol=tcp sport=59864 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=217.217.127.81 dst=88.116.81.183 protocol=tcp sport=59864 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59864,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "217.217.127.81",
"serverIP": "88.116.81.183"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=217.217.127.81 dst=88.116.81.183 protocol=tcp sport=59864 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=217.217.127.81 dst=88.116.81.183 protocol=tcp sport=59864 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59864
protocol: 6
streamName: meraki_l7_firewall
clientIP: 217.217.127.81
serverIP: 88.116.81.183
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=110.110.124.72 dst=106.212.35.230 protocol=tcp sport=59864 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=110.110.124.72 dst=106.212.35.230 protocol=tcp sport=59864 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59864,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "110.110.124.72",
"serverIP": "106.212.35.230"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=110.110.124.72 dst=106.212.35.230 protocol=tcp sport=59864 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=110.110.124.72 dst=106.212.35.230 protocol=tcp sport=59864 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59864
protocol: 6
streamName: meraki_l7_firewall
clientIP: 110.110.124.72
serverIP: 106.212.35.230
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=170.117.193.93 dst=63.102.170.186 protocol=tcp sport=59864 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=170.117.193.93 dst=63.102.170.186 protocol=tcp sport=59864 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59864,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "170.117.193.93",
"serverIP": "63.102.170.186"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=170.117.193.93 dst=63.102.170.186 protocol=tcp sport=59864 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=170.117.193.93 dst=63.102.170.186 protocol=tcp sport=59864 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59864
protocol: 6
streamName: meraki_l7_firewall
clientIP: 170.117.193.93
serverIP: 63.102.170.186
|
Explain this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=189.176.84.68 dst=0.85.196.126 protocol=tcp sport=59864 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=189.176.84.68 dst=0.85.196.126 protocol=tcp sport=59864 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59864,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "189.176.84.68",
"serverIP": "0.85.196.126"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=189.176.84.68 dst=0.85.196.126 protocol=tcp sport=59864 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.96.192.50 1 1659537714.717211488 M57_MX67C_PanamaCity l7_firewall src=189.176.84.68 dst=0.85.196.126 protocol=tcp sport=59864 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59864
protocol: 6
streamName: meraki_l7_firewall
clientIP: 189.176.84.68
serverIP: 0.85.196.126
|
Explain this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,255.72.80.168,208.202.134.4,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:21",
"message": "<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,255.72.80.168,208.202.134.4,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "255.72.80.168",
"serverIP": "208.202.134.4"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,255.72.80.168,208.202.134.4,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,255.72.80.168,208.202.134.4,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:21
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 255.72.80.168
serverIP: 208.202.134.4
|
Explain this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,85.244.235.171,208.150.144.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:21",
"message": "<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,85.244.235.171,208.150.144.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "85.244.235.171",
"serverIP": "208.150.144.217"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,85.244.235.171,208.150.144.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.