input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,85.244.235.171,208.150.144.217,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:21
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 85.244.235.171
serverIP: 208.150.144.217
|
Explain this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,10.113.64.220,170.54.244.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:21",
"message": "<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,10.113.64.220,170.54.244.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "10.113.64.220",
"serverIP": "170.54.244.147"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,10.113.64.220,170.54.244.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,10.113.64.220,170.54.244.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:21
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 10.113.64.220
serverIP: 170.54.244.147
|
Explain this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,183.231.5.123,184.83.87.46,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:21",
"message": "<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,183.231.5.123,184.83.87.46,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "183.231.5.123",
"serverIP": "184.83.87.46"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,183.231.5.123,184.83.87.46,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:19:21 DC1-PA3220-1 1,2024/04/10 10:19:21,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:21,183.231.5.123,184.83.87.46,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:19:21,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:19:14,0,any,,7349646988834847546,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:21.624-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:21
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 183.231.5.123
serverIP: 184.83.87.46
|
Explain this syslog message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,169.243.193.246,250.192.64.43,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65255,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:23",
"message": "<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,169.243.193.246,250.192.64.43,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 45621,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "250.192.64.43",
"serverIP": "169.243.193.246"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,169.243.193.246,250.192.64.43,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,169.243.193.246,250.192.64.43,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65255
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 45621
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 250.192.64.43
serverIP: 169.243.193.246
|
Explain this syslog message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,72.234.58.149,158.254.235.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 65255,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:19:23",
"message": "<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,72.234.58.149,158.254.235.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 45621,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "158.254.235.24",
"serverIP": "72.234.58.149"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,72.234.58.149,158.254.235.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:19:23 DC1-PA3220-1 1,2024/04/10 10:19:23,016201032964,TRAFFIC,drop,2562,2024/04/10 10:19:23,72.234.58.149,158.254.235.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:19:23,0,1,45621,65255,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:19:21,0,any,,7349646988834847758,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:19:23.221-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 65255
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:19:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 45621
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 158.254.235.24
serverIP: 72.234.58.149
|
Explain this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,141.34.131.57,181.252.120.32,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:24",
"message": "<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,141.34.131.57,181.252.120.32,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "141.34.131.57",
"serverIP": "181.252.120.32"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,141.34.131.57,181.252.120.32,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,141.34.131.57,181.252.120.32,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 141.34.131.57
serverIP: 181.252.120.32
|
Explain this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,127.124.90.228,23.159.158.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:24",
"message": "<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,127.124.90.228,23.159.158.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "127.124.90.228",
"serverIP": "23.159.158.242"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,127.124.90.228,23.159.158.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,127.124.90.228,23.159.158.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 127.124.90.228
serverIP: 23.159.158.242
|
Explain this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,101.202.147.195,7.103.55.220,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:24",
"message": "<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,101.202.147.195,7.103.55.220,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "101.202.147.195",
"serverIP": "7.103.55.220"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,101.202.147.195,7.103.55.220,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,101.202.147.195,7.103.55.220,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 101.202.147.195
serverIP: 7.103.55.220
|
Explain this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,196.197.10.115,10.212.50.180,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:24",
"message": "<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,196.197.10.115,10.212.50.180,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "196.197.10.115",
"serverIP": "10.212.50.180"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,196.197.10.115,10.212.50.180,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:24 DC1-PA3220-1 1,2024/04/10 10:18:24,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:24,196.197.10.115,10.212.50.180,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/04/10 10:18:24,0,1,44690,22,0,0,0x0,tcp,deny,60,60,0,1,2024/04/10 10:18:22,0,any,,7349646988834839962,0x0,Switzerland,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,c0fe488c-0a7a-42dc-9370-db45a93fc40a,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:24.239-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 196.197.10.115
serverIP: 10.212.50.180
|
Explain this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,113.18.60.218,92.196.108.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:04",
"message": "<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,113.18.60.218,92.196.108.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "113.18.60.218",
"serverIP": "92.196.108.138"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,113.18.60.218,92.196.108.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,113.18.60.218,92.196.108.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:04
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 113.18.60.218
serverIP: 92.196.108.138
|
Explain this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,208.106.224.231,49.83.56.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:04",
"message": "<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,208.106.224.231,49.83.56.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "208.106.224.231",
"serverIP": "49.83.56.132"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,208.106.224.231,49.83.56.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,208.106.224.231,49.83.56.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:04
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 208.106.224.231
serverIP: 49.83.56.132
|
Explain this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,58.91.46.177,119.18.134.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:04",
"message": "<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,58.91.46.177,119.18.134.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "58.91.46.177",
"serverIP": "119.18.134.118"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,58.91.46.177,119.18.134.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,58.91.46.177,119.18.134.118,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:04
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 58.91.46.177
serverIP: 119.18.134.118
|
Explain this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,205.171.33.251,122.105.182.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
{
"action": "block",
"application": "ping",
"clientbytes": 60,
"clientpackets": 1,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Apr 10 10:18:04",
"message": "<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,205.171.33.251,122.105.182.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 1,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "205.171.33.251",
"serverIP": "122.105.182.171"
}
|
Create a JSON artifact from the message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,205.171.33.251,122.105.182.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 10 10:18:04 DC1-PA3220-1 1,2024/04/10 10:18:04,016201032964,TRAFFIC,drop,2562,2024/04/10 10:18:04,205.171.33.251,122.105.182.171,0.0.0.0,0.0.0.0,Geo Block Inbound,,,ping,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2024/04/10 10:18:04,0,1,0,0,2048,0,0x100000,icmp,deny,60,60,0,1,2024/04/10 10:17:57,0,any,,7349646988834837157,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9dc1d0e6-c8d6-4b80-a7bc-5152b5f5105b,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-04-10T10:18:04.568-07:00,,,internet-utility,general-internet,network-protocol,2,"has-known-vulnerability,tunnel-other-application,pervasive-use",,untunneled,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: ping
clientbytes: 60
clientpackets: 1
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Apr 10 10:18:04
messagetype: traffic_drop
priority: 14
protocol: 1
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 205.171.33.251
serverIP: 122.105.182.171
|
Explain this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=2.89.101.247 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=49.51.91.245 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=49.51.91.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 30762,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1699096334344 ",
"message": "<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=2.89.101.247 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-tautology-conditions-simple\" token\\=\"; AND 1\\=1\" Parameter\\=\"EnvelopeKeyHex\" value\\=\"5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\\=1 OR (<'\\\\\">iKO))\\\\\"] duser=\"-\" src=49.51.91.245 spt=30762 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0\" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=49.51.91.245 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.169.10.103",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "49.51.91.245",
"serverIP": "2.89.101.247",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=2.89.101.247 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=49.51.91.245 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=49.51.91.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=2.89.101.247 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=49.51.91.245 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=49.51.91.245 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 30762
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1699096334344
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.169.10.103', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 49.51.91.245
serverIP: 2.89.101.247
userName: -
|
Explain this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=213.76.222.49 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=14.146.7.214 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=14.146.7.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 30762,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1699096334344 ",
"message": "<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=213.76.222.49 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-tautology-conditions-simple\" token\\=\"; AND 1\\=1\" Parameter\\=\"EnvelopeKeyHex\" value\\=\"5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\\=1 OR (<'\\\\\">iKO))\\\\\"] duser=\"-\" src=14.146.7.214 spt=30762 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0\" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=14.146.7.214 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.169.10.103",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "14.146.7.214",
"serverIP": "213.76.222.49",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=213.76.222.49 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=14.146.7.214 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=14.146.7.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=213.76.222.49 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=14.146.7.214 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=14.146.7.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 30762
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1699096334344
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.169.10.103', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 14.146.7.214
serverIP: 213.76.222.49
userName: -
|
Explain this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=253.131.240.168 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=161.81.117.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=161.81.117.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 30762,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1699096334344 ",
"message": "<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=253.131.240.168 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-tautology-conditions-simple\" token\\=\"; AND 1\\=1\" Parameter\\=\"EnvelopeKeyHex\" value\\=\"5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\\=1 OR (<'\\\\\">iKO))\\\\\"] duser=\"-\" src=161.81.117.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0\" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=161.81.117.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.169.10.103",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "161.81.117.249",
"serverIP": "253.131.240.168",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=253.131.240.168 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=161.81.117.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=161.81.117.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=253.131.240.168 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=161.81.117.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=161.81.117.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 30762
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1699096334344
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.169.10.103', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 161.81.117.249
serverIP: 253.131.240.168
userName: -
|
Explain this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=223.204.164.13 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=80.84.85.176 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=80.84.85.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 30762,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1699096334344 ",
"message": "<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=223.204.164.13 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-tautology-conditions-simple\" token\\=\"; AND 1\\=1\" Parameter\\=\"EnvelopeKeyHex\" value\\=\"5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\\=1 OR (<'\\\\\">iKO))\\\\\"] duser=\"-\" src=80.84.85.176 spt=30762 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0\" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=80.84.85.176 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.169.10.103",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "80.84.85.176",
"serverIP": "223.204.164.13",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=223.204.164.13 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=80.84.85.176 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=80.84.85.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=223.204.164.13 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=80.84.85.176 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=80.84.85.176 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 30762
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1699096334344
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.169.10.103', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 80.84.85.176
serverIP: 223.204.164.13
userName: -
|
Explain this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=209.244.7.252 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=143.167.138.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=143.167.138.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 30762,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/SinglePageRegPledge.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1699096334344 ",
"message": "<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=209.244.7.252 dpt=443 act=DENY msg=[type\\=\"sql-injection-medium\" pattern\\=\"sql-tautology-conditions-simple\" token\\=\"; AND 1\\=1\" Parameter\\=\"EnvelopeKeyHex\" value\\=\"5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\\=1 OR (<'\\\\\">iKO))\\\\\"] duser=\"-\" src=143.167.138.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0\" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=143.167.138.249 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "SQL_INJECTION_IN_PARAM",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:69.169.10.103",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"cef",
"AttackGroup:SQL Attacks",
"RuleID:security-policy",
"SessionID:-",
"SQL_INJECTION_IN_PARAM",
"barracuda_waf_SQL_INJECTION_IN_PARAM",
"FollowUpAction:NONE"
],
"vendorcode": "157",
"streamName": "barracuda_waf",
"clientIP": "143.167.138.249",
"serverIP": "209.244.7.252",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=209.244.7.252 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=143.167.138.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=143.167.138.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Nov 4 06:12:14 WAFirewall CEF:0|Barracuda|WAF|1210|157|SQL_INJECTION_IN_PARAM|1|cat=WF dst=209.244.7.252 dpt=443 act=DENY msg=[type\="sql-injection-medium" pattern\="sql-tautology-conditions-simple" token\="; AND 1\=1" Parameter\="EnvelopeKeyHex" value\="5A574C6F74714F5E59573C2F2D293E645652352A7E3E'nvOpzp; AND 1\=1 OR (<'\\">iKO))\\"] duser="-" src=143.167.138.249 spt=30762 requestMethod=GET app=TLSv1.2 requestContext="-" start=Nov 04 2023 06:12:14 rt=1699096334344 request=/comm/SinglePageRegPledge.jsp requestClientApplication="Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.0" dvchost=WAFirewall externalId=18b9a089008-3c9d1180 cn2=30762 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=SQL Attacks cs4Label=AttackGroup cs5=143.167.138.249 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 30762
facilitycode: 23
facilitylabel: local7
fqdn: /comm/SinglePageRegPledge.jsp
localhostname: WAFirewall
localstarttime: 1699096334344
messagetype: SQL_INJECTION_IN_PARAM
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:69.169.10.103', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'cef', 'AttackGroup:SQL Attacks', 'RuleID:security-policy', 'SessionID:-', 'SQL_INJECTION_IN_PARAM', 'barracuda_waf_SQL_INJECTION_IN_PARAM', 'FollowUpAction:NONE']
vendorcode: 157
streamName: barracuda_waf
clientIP: 143.167.138.249
serverIP: 209.244.7.252
userName: -
|
Explain this syslog message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,44.224.214.189,231.7.90.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52079,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:36:58",
"message": "<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,44.224.214.189,231.7.90.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5555,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "44.224.214.189",
"serverIP": "231.7.90.178"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,44.224.214.189,231.7.90.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,44.224.214.189,231.7.90.178,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52079
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:36:58
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5555
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 44.224.214.189
serverIP: 231.7.90.178
|
Explain this syslog message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,123.126.100.7,12.198.75.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52079,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:36:58",
"message": "<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,123.126.100.7,12.198.75.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5555,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "123.126.100.7",
"serverIP": "12.198.75.182"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,123.126.100.7,12.198.75.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:36:58 DC1-PA3220-1 1,2024/01/01 06:36:58,016201032964,TRAFFIC,drop,2562,2024/01/01 06:36:58,123.126.100.7,12.198.75.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:36:58,0,1,52079,5555,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:36:58,0,any,,7299323810850595748,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:36:58.301-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52079
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:36:58
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5555
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 123.126.100.7
serverIP: 12.198.75.182
|
Explain this syslog message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,233.171.214.45,81.223.76.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59218,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:33",
"message": "<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,233.171.214.45,81.223.76.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8453,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "233.171.214.45",
"serverIP": "81.223.76.107"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,233.171.214.45,81.223.76.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,233.171.214.45,81.223.76.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59218
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8453
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 233.171.214.45
serverIP: 81.223.76.107
|
Explain this syslog message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,132.131.153.240,4.75.100.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59218,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:33",
"message": "<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,132.131.153.240,4.75.100.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8453,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "132.131.153.240",
"serverIP": "4.75.100.151"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,132.131.153.240,4.75.100.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:33 DC1-PA3220-1 1,2024/01/01 06:38:33,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:33,132.131.153.240,4.75.100.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:33,0,1,59218,8453,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:38:33,0,any,,7299323810850602324,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:33.958-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59218
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:33
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8453
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 132.131.153.240
serverIP: 4.75.100.151
|
Explain this syslog message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,41.213.64.41,34.205.75.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 58484,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:13",
"message": "<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,41.213.64.41,34.205.75.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "41.213.64.41",
"serverIP": "34.205.75.208"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,41.213.64.41,34.205.75.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,41.213.64.41,34.205.75.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 58484
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 41.213.64.41
serverIP: 34.205.75.208
|
Explain this syslog message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,192.120.110.18,249.133.37.8,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 58484,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:13",
"message": "<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,192.120.110.18,249.133.37.8,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "192.120.110.18",
"serverIP": "249.133.37.8"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,192.120.110.18,249.133.37.8,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:13 DC1-PA3220-1 1,2024/01/01 06:38:13,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:13,192.120.110.18,249.133.37.8,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:38:13,0,1,58484,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:38:14,0,any,,7299323810850600837,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:13.963-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 58484
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 192.120.110.18
serverIP: 249.133.37.8
|
Explain this syslog message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,212.209.229.97,229.74.30.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 58690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:39",
"message": "<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,212.209.229.97,229.74.30.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "212.209.229.97",
"serverIP": "229.74.30.124"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,212.209.229.97,229.74.30.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,212.209.229.97,229.74.30.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 58690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 212.209.229.97
serverIP: 229.74.30.124
|
Explain this syslog message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,79.192.252.90,23.190.200.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 58690,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:39",
"message": "<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,79.192.252.90,23.190.200.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "79.192.252.90",
"serverIP": "23.190.200.50"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,79.192.252.90,23.190.200.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:39 DC1-PA3220-1 1,2024/01/01 06:43:38,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:38,79.192.252.90,23.190.200.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:38,0,1,58690,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:43:38,0,any,,7299323810850623912,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:39.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 58690
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:39
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 79.192.252.90
serverIP: 23.190.200.50
|
Explain this syslog message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,41.95.183.53,127.154.29.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 64,
"clientpackets": 1,
"clientport": 47586,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:16",
"message": "<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,41.95.183.53,127.154.29.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8125,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 64,
"streamName": "pan_firewall",
"clientIP": "41.95.183.53",
"serverIP": "127.154.29.38"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,41.95.183.53,127.154.29.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,41.95.183.53,127.154.29.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 64
clientpackets: 1
clientport: 47586
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8125
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 64
streamName: pan_firewall
clientIP: 41.95.183.53
serverIP: 127.154.29.38
|
Explain this syslog message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,177.248.112.235,25.136.232.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 64,
"clientpackets": 1,
"clientport": 47586,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:38:16",
"message": "<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,177.248.112.235,25.136.232.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8125,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 64,
"streamName": "pan_firewall",
"clientIP": "177.248.112.235",
"serverIP": "25.136.232.57"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,177.248.112.235,25.136.232.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:38:16 DC1-PA3220-1 1,2024/01/01 06:38:16,016201032964,TRAFFIC,drop,2562,2024/01/01 06:38:16,177.248.112.235,25.136.232.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2024/01/01 06:38:16,0,1,47586,8125,0,0,0x0,tcp,deny,64,64,0,1,2024/01/01 06:38:16,0,any,,7299323810850601019,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:38:16.920-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 64
clientpackets: 1
clientport: 47586
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:38:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8125
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 64
streamName: pan_firewall
clientIP: 177.248.112.235
serverIP: 25.136.232.57
|
Explain this syslog message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,220.6.133.225,249.96.136.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55468,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:41:01",
"message": "<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,220.6.133.225,249.96.136.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4428,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "220.6.133.225",
"serverIP": "249.96.136.146"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,220.6.133.225,249.96.136.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,220.6.133.225,249.96.136.146,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55468
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:41:01
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4428
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 220.6.133.225
serverIP: 249.96.136.146
|
Explain this syslog message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,145.49.156.44,113.166.37.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55468,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:41:01",
"message": "<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,145.49.156.44,113.166.37.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4428,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "145.49.156.44",
"serverIP": "113.166.37.36"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,145.49.156.44,113.166.37.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:41:01 DC1-PA3220-1 1,2024/01/01 06:41:01,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:01,145.49.156.44,113.166.37.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:01,0,1,55468,4428,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:41:00,0,any,,7299323810850612801,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:01.308-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55468
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:41:01
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4428
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 145.49.156.44
serverIP: 113.166.37.36
|
Explain this syslog message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,108.226.60.235,57.4.111.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 45653,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:00",
"message": "<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,108.226.60.235,57.4.111.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 33621,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "57.4.111.147",
"serverIP": "108.226.60.235"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,108.226.60.235,57.4.111.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,108.226.60.235,57.4.111.147,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 45653
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 33621
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 57.4.111.147
serverIP: 108.226.60.235
|
Explain this syslog message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,92.24.214.28,246.207.211.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 45653,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:00",
"message": "<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,92.24.214.28,246.207.211.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 33621,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "246.207.211.145",
"serverIP": "92.24.214.28"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,92.24.214.28,246.207.211.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:00 DC1-PA3220-1 1,2024/01/01 06:42:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:00,92.24.214.28,246.207.211.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:00,0,1,33621,45653,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:01,0,any,,7299323810850617071,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:00.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 45653
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 33621
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 246.207.211.145
serverIP: 92.24.214.28
|
Explain this syslog message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,242.215.177.102,163.106.19.45,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 55041,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:41:15",
"message": "<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,242.215.177.102,163.106.19.45,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "242.215.177.102",
"serverIP": "163.106.19.45"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,242.215.177.102,163.106.19.45,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,242.215.177.102,163.106.19.45,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 55041
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:41:15
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 242.215.177.102
serverIP: 163.106.19.45
|
Explain this syslog message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,48.233.106.147,147.119.54.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 55041,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:41:15",
"message": "<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,48.233.106.147,147.119.54.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "48.233.106.147",
"serverIP": "147.119.54.153"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,48.233.106.147,147.119.54.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:41:15 DC1-PA3220-1 1,2024/01/01 06:41:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:41:15,48.233.106.147,147.119.54.153,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:41:15,0,1,55041,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:41:15,0,any,,7299323810850613866,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:41:15.998-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 55041
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:41:15
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 48.233.106.147
serverIP: 147.119.54.153
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.