input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,24.8.121.172,35.88.210.163,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49364,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:45:16",
"message": "<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,24.8.121.172,35.88.210.163,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8080,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "24.8.121.172",
"serverIP": "35.88.210.163"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,24.8.121.172,35.88.210.163,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,24.8.121.172,35.88.210.163,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49364
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:45:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8080
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 24.8.121.172
serverIP: 35.88.210.163
|
Explain this syslog message
|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,187.39.59.62,254.51.255.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49364,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:45:16",
"message": "<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,187.39.59.62,254.51.255.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8080,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "187.39.59.62",
"serverIP": "254.51.255.53"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,187.39.59.62,254.51.255.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:45:16 DC1-PA3220-1 1,2024/01/01 06:45:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:45:15,187.39.59.62,254.51.255.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:45:15,0,1,49364,8080,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:45:15,0,any,,7299323810850631272,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:45:16.004-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49364
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:45:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8080
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 187.39.59.62
serverIP: 254.51.255.53
|
Explain this syslog message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,174.121.35.17,88.159.130.18,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 71,
"clientpackets": 1,
"clientport": 35138,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:06",
"message": "<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,174.121.35.17,88.159.130.18,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8333,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 71,
"streamName": "pan_firewall",
"clientIP": "174.121.35.17",
"serverIP": "88.159.130.18"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,174.121.35.17,88.159.130.18,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,174.121.35.17,88.159.130.18,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 71
clientpackets: 1
clientport: 35138
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:06
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8333
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 71
streamName: pan_firewall
clientIP: 174.121.35.17
serverIP: 88.159.130.18
|
Explain this syslog message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,245.113.138.41,253.216.86.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 71,
"clientpackets": 1,
"clientport": 35138,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:06",
"message": "<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,245.113.138.41,253.216.86.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8333,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 71,
"streamName": "pan_firewall",
"clientIP": "245.113.138.41",
"serverIP": "253.216.86.127"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,245.113.138.41,253.216.86.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:06 DC1-PA3220-1 1,2024/01/01 06:42:06,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:06,245.113.138.41,253.216.86.127,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:06,0,1,35138,8333,0,0,0x0,udp,deny,71,71,0,1,2024/01/01 06:42:07,0,any,,7299323810850617439,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:06.966-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 71
clientpackets: 1
clientport: 35138
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:06
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8333
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 71
streamName: pan_firewall
clientIP: 245.113.138.41
serverIP: 253.216.86.127
|
Explain this syslog message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,19.134.177.61,215.252.162.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55825,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:03",
"message": "<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,19.134.177.61,215.252.162.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "19.134.177.61",
"serverIP": "215.252.162.238"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,19.134.177.61,215.252.162.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,19.134.177.61,215.252.162.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55825
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:03
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 19.134.177.61
serverIP: 215.252.162.238
|
Explain this syslog message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,108.97.241.114,29.155.13.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55825,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:42:03",
"message": "<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,108.97.241.114,29.155.13.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 17389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "108.97.241.114",
"serverIP": "29.155.13.50"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,108.97.241.114,29.155.13.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:42:03 DC1-PA3220-1 1,2024/01/01 06:42:02,016201032964,TRAFFIC,drop,2562,2024/01/01 06:42:02,108.97.241.114,29.155.13.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:42:02,0,1,55825,17389,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:42:02,0,any,,7299323810850617163,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:42:03.304-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55825
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:42:03
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 17389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 108.97.241.114
serverIP: 29.155.13.50
|
Explain this syslog message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,139.123.63.182,124.83.22.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 40076,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:00",
"message": "<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,139.123.63.182,124.83.22.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "139.123.63.182",
"serverIP": "124.83.22.81"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,139.123.63.182,124.83.22.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,139.123.63.182,124.83.22.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 40076
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2222
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 139.123.63.182
serverIP: 124.83.22.81
|
Explain this syslog message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,54.106.181.174,101.235.40.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 40076,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:00",
"message": "<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,54.106.181.174,101.235.40.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "54.106.181.174",
"serverIP": "101.235.40.148"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,54.106.181.174,101.235.40.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:00 DC1-PA3220-1 1,2024/01/01 06:43:00,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:00,54.106.181.174,101.235.40.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:00,0,1,40076,2222,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:42:59,0,any,,7299323810850621085,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:00.384-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 40076
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:00
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2222
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 54.106.181.174
serverIP: 101.235.40.148
|
Explain this syslog message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,111.115.58.171,101.208.153.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40844,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:16",
"message": "<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,111.115.58.171,101.208.153.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10909,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "111.115.58.171",
"serverIP": "101.208.153.164"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,111.115.58.171,101.208.153.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,111.115.58.171,101.208.153.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40844
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10909
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 111.115.58.171
serverIP: 101.208.153.164
|
Explain this syslog message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,61.214.63.35,113.8.185.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 40844,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:43:16",
"message": "<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,61.214.63.35,113.8.185.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 10909,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "61.214.63.35",
"serverIP": "113.8.185.208"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,61.214.63.35,113.8.185.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:43:16 DC1-PA3220-1 1,2024/01/01 06:43:15,016201032964,TRAFFIC,drop,2562,2024/01/01 06:43:15,61.214.63.35,113.8.185.208,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:43:15,0,1,40844,10909,0,0,0x0,tcp,deny,60,60,0,1,2024/01/01 06:43:15,0,any,,7299323810850622192,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:43:16.305-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 40844
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:43:16
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 10909
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 61.214.63.35
serverIP: 113.8.185.208
|
Explain this syslog message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,246.28.29.196,171.116.196.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 43695,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:44:30",
"message": "<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,246.28.29.196,171.116.196.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "246.28.29.196",
"serverIP": "171.116.196.243"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,246.28.29.196,171.116.196.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,246.28.29.196,171.116.196.243,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 43695
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:44:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 246.28.29.196
serverIP: 171.116.196.243
|
Explain this syslog message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,62.28.5.183,216.243.29.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 43695,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jan 1 06:44:30",
"message": "<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,62.28.5.183,216.243.29.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "62.28.5.183",
"serverIP": "216.243.29.114"
}
|
Create a JSON artifact from the message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,62.28.5.183,216.243.29.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jan 1 06:44:30 DC1-PA3220-1 1,2024/01/01 06:44:30,016201032964,TRAFFIC,drop,2562,2024/01/01 06:44:30,62.28.5.183,216.243.29.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2024/01/01 06:44:30,0,1,43695,23,0,0,0x0,tcp,deny,74,74,0,1,2024/01/01 06:44:29,0,any,,7299323810850627733,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-01-01T06:44:30.462-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 43695
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jan 1 06:44:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 62.28.5.183
serverIP: 216.243.29.114
|
Explain this syslog message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,58.40.171.167,209.40.240.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56918,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:12:28",
"message": "<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,58.40.171.167,209.40.240.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "58.40.171.167",
"serverIP": "209.40.240.160"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,58.40.171.167,209.40.240.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,58.40.171.167,209.40.240.160,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56918
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:12:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 58.40.171.167
serverIP: 209.40.240.160
|
Explain this syslog message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,93.59.198.18,78.51.239.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56918,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:12:28",
"message": "<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,93.59.198.18,78.51.239.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "93.59.198.18",
"serverIP": "78.51.239.229"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,93.59.198.18,78.51.239.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:12:28 DC1-PA3220-1 1,2023/11/12 16:12:27,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:27,93.59.198.18,78.51.239.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:27,0,1,56918,80,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:12:28,0,any,,7299323810370949318,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:28.029-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56918
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:12:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 93.59.198.18
serverIP: 78.51.239.229
|
Explain this syslog message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,248.245.148.112,26.132.97.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42186,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:27:38",
"message": "<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,248.245.148.112,26.132.97.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8888,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "248.245.148.112",
"serverIP": "26.132.97.166"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,248.245.148.112,26.132.97.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,248.245.148.112,26.132.97.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42186
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:27:38
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8888
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 248.245.148.112
serverIP: 26.132.97.166
|
Explain this syslog message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,97.143.128.221,37.106.114.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 42186,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:27:38",
"message": "<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,97.143.128.221,37.106.114.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8888,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "97.143.128.221",
"serverIP": "37.106.114.172"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,97.143.128.221,37.106.114.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:27:38 DC1-PA3220-1 1,2023/11/12 16:27:38,016201032964,TRAFFIC,drop,2562,2023/11/12 16:27:38,97.143.128.221,37.106.114.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:27:38,0,1,42186,8888,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:27:38,0,any,,7299323810371011537,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:27:38.931-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 42186
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:27:38
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8888
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 97.143.128.221
serverIP: 37.106.114.172
|
Explain this syslog message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,50.9.131.134,196.219.205.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 51658,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:12:20",
"message": "<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,50.9.131.134,196.219.205.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "50.9.131.134",
"serverIP": "196.219.205.6"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,50.9.131.134,196.219.205.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,50.9.131.134,196.219.205.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 51658
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:12:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 1433
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 50.9.131.134
serverIP: 196.219.205.6
|
Explain this syslog message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,54.156.4.8,254.208.21.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 51658,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:12:20",
"message": "<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,54.156.4.8,254.208.21.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "54.156.4.8",
"serverIP": "254.208.21.32"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,54.156.4.8,254.208.21.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:12:20 DC1-PA3220-1 1,2023/11/12 16:12:20,016201032964,TRAFFIC,drop,2562,2023/11/12 16:12:20,54.156.4.8,254.208.21.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:12:20,0,1,51658,1433,0,0,0x0,tcp,deny,66,66,0,1,2023/11/12 16:12:21,0,any,,7299323810370948847,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:12:20.940-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 51658
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:12:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 1433
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 54.156.4.8
serverIP: 254.208.21.32
|
Explain this syslog message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,146.118.89.155,125.237.111.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 78,
"clientpackets": 1,
"clientport": 34606,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:36:04",
"message": "<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,146.118.89.155,125.237.111.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 78,
"streamName": "pan_firewall",
"clientIP": "146.118.89.155",
"serverIP": "125.237.111.138"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,146.118.89.155,125.237.111.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,146.118.89.155,125.237.111.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 78
clientpackets: 1
clientport: 34606
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:36:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 78
streamName: pan_firewall
clientIP: 146.118.89.155
serverIP: 125.237.111.138
|
Explain this syslog message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,128.202.112.108,230.23.35.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 78,
"clientpackets": 1,
"clientport": 34606,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:36:04",
"message": "<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,128.202.112.108,230.23.35.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 78,
"streamName": "pan_firewall",
"clientIP": "128.202.112.108",
"serverIP": "230.23.35.77"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,128.202.112.108,230.23.35.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:36:04 DC1-PA3220-1 1,2023/11/12 16:36:04,016201032964,TRAFFIC,drop,2562,2023/11/12 16:36:04,128.202.112.108,230.23.35.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:36:04,0,1,34606,23,0,0,0x0,tcp,deny,78,78,0,1,2023/11/12 16:36:05,0,any,,7299323810371046809,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:36:04.952-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 78
clientpackets: 1
clientport: 34606
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:36:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 78
streamName: pan_firewall
clientIP: 128.202.112.108
serverIP: 230.23.35.77
|
Explain this syslog message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,80.161.13.209,197.215.1.142,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 70,
"clientpackets": 1,
"clientport": 34058,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:13:21",
"message": "<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,80.161.13.209,197.215.1.142,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7676,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 70,
"streamName": "pan_firewall",
"clientIP": "80.161.13.209",
"serverIP": "197.215.1.142"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,80.161.13.209,197.215.1.142,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,80.161.13.209,197.215.1.142,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 70
clientpackets: 1
clientport: 34058
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:13:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7676
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 70
streamName: pan_firewall
clientIP: 80.161.13.209
serverIP: 197.215.1.142
|
Explain this syslog message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,92.201.140.22,96.153.157.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 70,
"clientpackets": 1,
"clientport": 34058,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:13:21",
"message": "<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,92.201.140.22,96.153.157.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Block EDL",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7676,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 70,
"streamName": "pan_firewall",
"clientIP": "92.201.140.22",
"serverIP": "96.153.157.242"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,92.201.140.22,96.153.157.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:13:21 DC1-PA3220-1 1,2023/11/12 16:13:21,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:21,92.201.140.22,96.153.157.242,0.0.0.0,0.0.0.0,Block EDL,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/12 16:13:21,0,1,34058,7676,0,0,0x0,tcp,deny,70,70,0,1,2023/11/12 16:13:21,0,any,,7299323810370952898,0x0,Indonesia,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,9c9bdc16-a293-4006-8e12-bbeec26a625d,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:21.319-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 70
clientpackets: 1
clientport: 34058
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:13:21
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Block EDL
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7676
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 70
streamName: pan_firewall
clientIP: 92.201.140.22
serverIP: 96.153.157.242
|
Explain this syslog message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,178.251.10.79,233.165.178.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 18348,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:10:47",
"message": "<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,178.251.10.79,233.165.178.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 11211,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "178.251.10.79",
"serverIP": "233.165.178.108"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,178.251.10.79,233.165.178.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,178.251.10.79,233.165.178.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 18348
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:10:47
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 11211
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 178.251.10.79
serverIP: 233.165.178.108
|
Explain this syslog message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,58.241.188.213,48.134.159.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 18348,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:10:47",
"message": "<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,58.241.188.213,48.134.159.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 17,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 11211,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "58.241.188.213",
"serverIP": "48.134.159.38"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,58.241.188.213,48.134.159.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:10:47 DC1-PA3220-1 1,2023/11/12 16:10:47,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:47,58.241.188.213,48.134.159.38,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:47,0,1,18348,11211,0,0,0x0,udp,deny,60,60,0,1,2023/11/12 16:10:48,0,any,,7299323810370941635,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:47.922-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 18348
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:10:47
messagetype: traffic_drop
priority: 14
protocol: 17
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 11211
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 58.241.188.213
serverIP: 48.134.159.38
|
Explain this syslog message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,31.180.158.133,12.180.8.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 56718,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:18:13",
"message": "<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,31.180.158.133,12.180.8.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "31.180.158.133",
"serverIP": "12.180.8.133"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,31.180.158.133,12.180.8.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,31.180.158.133,12.180.8.133,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 56718
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:18:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 31.180.158.133
serverIP: 12.180.8.133
|
Explain this syslog message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,56.142.212.236,36.65.96.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 56718,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:18:13",
"message": "<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,56.142.212.236,36.65.96.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "56.142.212.236",
"serverIP": "36.65.96.76"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,56.142.212.236,36.65.96.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:18:13 DC1-PA3220-1 1,2023/11/12 16:18:13,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:13,56.142.212.236,36.65.96.76,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:13,0,1,56718,23,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:18:13,0,any,,7299323810370972873,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:13.541-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 56718
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:18:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 56.142.212.236
serverIP: 36.65.96.76
|
Explain this syslog message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,194.245.193.27,210.60.141.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 44158,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:18:58",
"message": "<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,194.245.193.27,210.60.141.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 24858,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "210.60.141.197",
"serverIP": "194.245.193.27"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,194.245.193.27,210.60.141.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,194.245.193.27,210.60.141.197,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 44158
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:18:58
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 24858
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 210.60.141.197
serverIP: 194.245.193.27
|
Explain this syslog message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,238.250.42.34,5.46.79.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 44158,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:18:58",
"message": "<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,238.250.42.34,5.46.79.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 24858,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "5.46.79.44",
"serverIP": "238.250.42.34"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,238.250.42.34,5.46.79.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:18:58 DC1-PA3220-1 1,2023/11/12 16:18:58,016201032964,TRAFFIC,drop,2562,2023/11/12 16:18:58,238.250.42.34,5.46.79.44,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:18:58,0,1,24858,44158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:18:59,0,any,,7299323810370975591,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:18:58.992-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 44158
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:18:58
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 24858
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 5.46.79.44
serverIP: 238.250.42.34
|
Explain this syslog message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,190.157.55.52,179.154.206.221,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52850,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:10:54",
"message": "<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,190.157.55.52,179.154.206.221,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 38916,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "190.157.55.52",
"serverIP": "179.154.206.221"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,190.157.55.52,179.154.206.221,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,190.157.55.52,179.154.206.221,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52850
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:10:54
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 38916
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 190.157.55.52
serverIP: 179.154.206.221
|
Explain this syslog message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,25.163.215.184,59.99.181.134,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52850,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:10:54",
"message": "<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,25.163.215.184,59.99.181.134,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 38916,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "25.163.215.184",
"serverIP": "59.99.181.134"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,25.163.215.184,59.99.181.134,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:10:54 DC1-PA3220-1 1,2023/11/12 16:10:54,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:54,25.163.215.184,59.99.181.134,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:54,0,1,52850,38916,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:55,0,any,,7299323810370942231,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:54.939-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52850
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:10:54
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 38916
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 25.163.215.184
serverIP: 59.99.181.134
|
Explain this syslog message
|
<14>Nov 12 16:10:45 DC1-PA3220-1 1,2023/11/12 16:10:45,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:45,95.75.106.142,238.100.102.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:45,0,1,53807,54291,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:46,0,any,,7299323810370941525,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:45.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54291,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:10:45",
"message": "<14>Nov 12 16:10:45 DC1-PA3220-1 1,2023/11/12 16:10:45,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:45,95.75.106.142,238.100.102.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:45,0,1,53807,54291,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:46,0,any,,7299323810370941525,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:45.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 53807,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "238.100.102.174",
"serverIP": "95.75.106.142"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:10:45 DC1-PA3220-1 1,2023/11/12 16:10:45,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:45,95.75.106.142,238.100.102.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:45,0,1,53807,54291,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:46,0,any,,7299323810370941525,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:45.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:10:45 DC1-PA3220-1 1,2023/11/12 16:10:45,016201032964,TRAFFIC,drop,2562,2023/11/12 16:10:45,95.75.106.142,238.100.102.174,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:10:45,0,1,53807,54291,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:10:46,0,any,,7299323810370941525,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:10:45.999-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54291
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:10:45
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 53807
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 238.100.102.174
serverIP: 95.75.106.142
|
Explain this syslog message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,144.17.179.216,100.66.218.251,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 53281,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:13:23",
"message": "<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,144.17.179.216,100.66.218.251,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43530,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "100.66.218.251",
"serverIP": "144.17.179.216"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,144.17.179.216,100.66.218.251,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,144.17.179.216,100.66.218.251,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 53281
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:13:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43530
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 100.66.218.251
serverIP: 144.17.179.216
|
Explain this syslog message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,4.66.12.177,80.117.245.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 53281,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:13:23",
"message": "<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,4.66.12.177,80.117.245.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 43530,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "80.117.245.182",
"serverIP": "4.66.12.177"
}
|
Create a JSON artifact from the message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,4.66.12.177,80.117.245.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 12 16:13:23 DC1-PA3220-1 1,2023/11/12 16:13:22,016201032964,TRAFFIC,drop,2562,2023/11/12 16:13:22,4.66.12.177,80.117.245.182,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:13:22,0,1,43530,53281,0,0,0x0,tcp,deny,60,60,0,1,2023/11/12 16:13:23,0,any,,7299323810370953032,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:13:23.039-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 53281
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 12 16:13:23
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 43530
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 80.117.245.182
serverIP: 4.66.12.177
|
Explain this syslog message
|
<14>Nov 12 16:43:59 DC1-PA3220-1 1,2023/11/12 16:43:59,016201032964,TRAFFIC,drop,2562,2023/11/12 16:43:59,157.17.163.248,132.216.154.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:43:59,0,1,50084,2222,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:44:00,0,any,,7299323810371079524,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:43:59.521-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 50084,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 12 16:43:59",
"message": "<14>Nov 12 16:43:59 DC1-PA3220-1 1,2023/11/12 16:43:59,016201032964,TRAFFIC,drop,2562,2023/11/12 16:43:59,157.17.163.248,132.216.154.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/12 16:43:59,0,1,50084,2222,0,0,0x0,tcp,deny,74,74,0,1,2023/11/12 16:44:00,0,any,,7299323810371079524,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-12T16:43:59.521-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "157.17.163.248",
"serverIP": "132.216.154.77"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.