input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>May 8 00:06:04 DC1-PA3220-1 1,2023/05/08 00:06:03,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:03,178.224.143.254,147.187.150.175,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:03,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:03,0,any,0,5245209040,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:04.411-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:06:04 DC1-PA3220-1 1,2023/05/08 00:06:03,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:03,178.224.143.254,147.187.150.175,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:03,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:03,0,any,0,5245209040,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:04.411-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 63390
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:06:04
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41464
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 147.187.150.175
serverIP: 178.224.143.254
|
Explain this syslog message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,180.128.25.102,6.231.50.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 63390,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:19",
"message": "<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,180.128.25.102,6.231.50.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41464,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "6.231.50.227",
"serverIP": "180.128.25.102"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,180.128.25.102,6.231.50.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,180.128.25.102,6.231.50.227,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 63390
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:19
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41464
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 6.231.50.227
serverIP: 180.128.25.102
|
Explain this syslog message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,93.119.17.132,9.206.182.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 63390,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:19",
"message": "<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,93.119.17.132,9.206.182.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41464,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "9.206.182.145",
"serverIP": "93.119.17.132"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,93.119.17.132,9.206.182.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:19 DC1-PA3220-1 1,2023/05/08 00:05:18,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:18,93.119.17.132,9.206.182.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:18,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:18,0,any,0,5245204539,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:19.402-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 63390
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:19
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41464
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 9.206.182.145
serverIP: 93.119.17.132
|
Explain this syslog message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,152.214.128.8,25.214.30.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44304,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:28",
"message": "<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,152.214.128.8,25.214.30.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "152.214.128.8",
"serverIP": "25.214.30.219"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,152.214.128.8,25.214.30.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,152.214.128.8,25.214.30.219,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44304
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 152.214.128.8
serverIP: 25.214.30.219
|
Explain this syslog message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,130.231.82.242,192.190.198.215,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44304,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:28",
"message": "<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,130.231.82.242,192.190.198.215,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "130.231.82.242",
"serverIP": "192.190.198.215"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,130.231.82.242,192.190.198.215,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:28 DC1-PA3220-1 1,2023/05/08 00:05:27,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:27,130.231.82.242,192.190.198.215,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:27,0,1,44304,3389,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:27,0,any,0,5245205421,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:28.404-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44304
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 130.231.82.242
serverIP: 192.190.198.215
|
Explain this syslog message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,141.144.113.130,130.184.248.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56399,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:40",
"message": "<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,141.144.113.130,130.184.248.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8007,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "141.144.113.130",
"serverIP": "130.184.248.50"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,141.144.113.130,130.184.248.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,141.144.113.130,130.184.248.50,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56399
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8007
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 141.144.113.130
serverIP: 130.184.248.50
|
Explain this syslog message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,30.220.149.101,202.15.169.142,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56399,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:05:40",
"message": "<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,30.220.149.101,202.15.169.142,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8007,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "30.220.149.101",
"serverIP": "202.15.169.142"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,30.220.149.101,202.15.169.142,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:05:40 DC1-PA3220-1 1,2023/05/08 00:05:39,016201032964,TRAFFIC,drop,2560,2023/05/08 00:05:39,30.220.149.101,202.15.169.142,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:05:39,0,1,56399,8007,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:05:39,0,any,0,5245206513,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:05:40.406-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56399
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:05:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8007
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 30.220.149.101
serverIP: 202.15.169.142
|
Explain this syslog message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,191.173.196.230,18.197.195.156,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 27902,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:06:56",
"message": "<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,191.173.196.230,18.197.195.156,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 15180,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "191.173.196.230",
"serverIP": "18.197.195.156"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,191.173.196.230,18.197.195.156,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,191.173.196.230,18.197.195.156,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 27902
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:06:56
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 15180
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 191.173.196.230
serverIP: 18.197.195.156
|
Explain this syslog message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,30.48.53.207,9.200.167.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 27902,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:06:56",
"message": "<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,30.48.53.207,9.200.167.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 15180,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "30.48.53.207",
"serverIP": "9.200.167.238"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,30.48.53.207,9.200.167.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:06:56 DC1-PA3220-1 1,2023/05/08 00:06:55,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:55,30.48.53.207,9.200.167.238,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:55,0,1,27902,15180,0,0,0x0,tcp,deny,66,66,0,1,2023/05/08 00:06:55,0,any,0,5245214045,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:56.421-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 27902
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:06:56
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 15180
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 30.48.53.207
serverIP: 9.200.167.238
|
Explain this syslog message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,207.139.200.163,252.126.36.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47447,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:07:14",
"message": "<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,207.139.200.163,252.126.36.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2160,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "207.139.200.163",
"serverIP": "252.126.36.189"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,207.139.200.163,252.126.36.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,207.139.200.163,252.126.36.189,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47447
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:07:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2160
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 207.139.200.163
serverIP: 252.126.36.189
|
Explain this syslog message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,121.101.154.135,248.214.193.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 47447,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:07:14",
"message": "<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,121.101.154.135,248.214.193.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2160,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "121.101.154.135",
"serverIP": "248.214.193.166"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,121.101.154.135,248.214.193.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:07:14 DC1-PA3220-1 1,2023/05/08 00:07:13,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:13,121.101.154.135,248.214.193.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:13,0,1,47447,2160,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:13,0,any,0,5245216122,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:14.425-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 47447
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:07:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2160
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 121.101.154.135
serverIP: 248.214.193.166
|
Explain this syslog message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,188.168.118.230,95.150.109.194,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49137,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:06:37",
"message": "<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,188.168.118.230,95.150.109.194,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "188.168.118.230",
"serverIP": "95.150.109.194"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,188.168.118.230,95.150.109.194,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,188.168.118.230,95.150.109.194,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49137
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:06:37
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7547
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 188.168.118.230
serverIP: 95.150.109.194
|
Explain this syslog message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,231.120.191.58,124.204.145.49,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49137,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:06:37",
"message": "<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,231.120.191.58,124.204.145.49,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "231.120.191.58",
"serverIP": "124.204.145.49"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,231.120.191.58,124.204.145.49,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:06:37 DC1-PA3220-1 1,2023/05/08 00:06:36,016201032964,TRAFFIC,drop,2560,2023/05/08 00:06:36,231.120.191.58,124.204.145.49,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:06:36,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:06:36,0,any,0,5245212146,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:06:37.418-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49137
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:06:37
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7547
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 231.120.191.58
serverIP: 124.204.145.49
|
Explain this syslog message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,205.205.213.44,143.78.255.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 63390,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:07:57",
"message": "<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,205.205.213.44,143.78.255.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41464,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "143.78.255.32",
"serverIP": "205.205.213.44"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,205.205.213.44,143.78.255.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,205.205.213.44,143.78.255.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 63390
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:07:57
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41464
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 143.78.255.32
serverIP: 205.205.213.44
|
Explain this syslog message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,107.141.90.182,145.199.224.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 63390,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:07:57",
"message": "<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,107.141.90.182,145.199.224.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41464,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "145.199.224.79",
"serverIP": "107.141.90.182"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,107.141.90.182,145.199.224.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:07:57 DC1-PA3220-1 1,2023/05/08 00:07:56,016201032964,TRAFFIC,drop,2560,2023/05/08 00:07:56,107.141.90.182,145.199.224.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:07:56,0,1,41464,63390,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:07:56,0,any,0,5245220417,0x0,Germany,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:07:57.435-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 63390
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:07:57
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41464
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 145.199.224.79
serverIP: 107.141.90.182
|
Explain this syslog message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,52.199.33.1,92.8.239.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54825,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:13:24",
"message": "<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,52.199.33.1,92.8.239.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "52.199.33.1",
"serverIP": "92.8.239.98"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,52.199.33.1,92.8.239.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,52.199.33.1,92.8.239.98,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54825
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:13:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 52.199.33.1
serverIP: 92.8.239.98
|
Explain this syslog message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,85.95.7.192,222.130.31.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54825,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:13:24",
"message": "<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,85.95.7.192,222.130.31.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "85.95.7.192",
"serverIP": "222.130.31.132"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,85.95.7.192,222.130.31.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:13:24 DC1-PA3220-1 1,2023/05/08 00:13:23,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:23,85.95.7.192,222.130.31.132,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:23,0,1,54825,81,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:23,0,any,0,5245251584,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:24.501-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54825
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:13:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 85.95.7.192
serverIP: 222.130.31.132
|
Explain this syslog message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,97.225.67.149,121.41.29.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49137,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:13:18",
"message": "<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,97.225.67.149,121.41.29.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "97.225.67.149",
"serverIP": "121.41.29.32"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,97.225.67.149,121.41.29.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,97.225.67.149,121.41.29.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49137
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:13:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7547
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 97.225.67.149
serverIP: 121.41.29.32
|
Explain this syslog message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,249.223.136.113,47.107.154.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49137,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "May 8 00:13:18",
"message": "<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,249.223.136.113,47.107.154.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "249.223.136.113",
"serverIP": "47.107.154.101"
}
|
Create a JSON artifact from the message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,249.223.136.113,47.107.154.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>May 8 00:13:18 DC1-PA3220-1 1,2023/05/08 00:13:17,016201032964,TRAFFIC,drop,2560,2023/05/08 00:13:17,249.223.136.113,47.107.154.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/05/08 00:13:17,0,1,49137,7547,0,0,0x0,tcp,deny,60,60,0,1,2023/05/08 00:13:17,0,any,0,5245251039,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-05-08T00:13:18.500-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49137
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: May 8 00:13:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7547
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 249.223.136.113
serverIP: 47.107.154.101
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=95.116.88.115 dst=20.209.168.217 protocol=tcp sport=443 dport=15990 decision=blocked
|
{
"action": "block",
"clientport": 15990,
"message": "<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=95.116.88.115 dst=20.209.168.217 protocol=tcp sport=443 dport=15990 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "20.209.168.217",
"serverIP": "95.116.88.115"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=95.116.88.115 dst=20.209.168.217 protocol=tcp sport=443 dport=15990 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=95.116.88.115 dst=20.209.168.217 protocol=tcp sport=443 dport=15990 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 15990
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 20.209.168.217
serverIP: 95.116.88.115
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=42.220.81.36 dst=104.212.72.201 protocol=tcp sport=443 dport=15990 decision=blocked
|
{
"action": "block",
"clientport": 15990,
"message": "<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=42.220.81.36 dst=104.212.72.201 protocol=tcp sport=443 dport=15990 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "104.212.72.201",
"serverIP": "42.220.81.36"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=42.220.81.36 dst=104.212.72.201 protocol=tcp sport=443 dport=15990 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=42.220.81.36 dst=104.212.72.201 protocol=tcp sport=443 dport=15990 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 15990
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 104.212.72.201
serverIP: 42.220.81.36
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=47.236.72.91 dst=62.79.68.161 protocol=tcp sport=443 dport=15990 decision=blocked
|
{
"action": "block",
"clientport": 15990,
"message": "<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=47.236.72.91 dst=62.79.68.161 protocol=tcp sport=443 dport=15990 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "62.79.68.161",
"serverIP": "47.236.72.91"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=47.236.72.91 dst=62.79.68.161 protocol=tcp sport=443 dport=15990 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=47.236.72.91 dst=62.79.68.161 protocol=tcp sport=443 dport=15990 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 15990
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 62.79.68.161
serverIP: 47.236.72.91
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=122.1.43.78 dst=232.147.29.156 protocol=tcp sport=443 dport=15990 decision=blocked
|
{
"action": "block",
"clientport": 15990,
"message": "<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=122.1.43.78 dst=232.147.29.156 protocol=tcp sport=443 dport=15990 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "232.147.29.156",
"serverIP": "122.1.43.78"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=122.1.43.78 dst=232.147.29.156 protocol=tcp sport=443 dport=15990 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688680386.267227352 NORDC_MX400_1 l7_firewall src=122.1.43.78 dst=232.147.29.156 protocol=tcp sport=443 dport=15990 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 15990
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 232.147.29.156
serverIP: 122.1.43.78
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=147.40.35.17 dst=52.175.54.39 protocol=tcp sport=443 dport=54364 decision=blocked
|
{
"action": "block",
"clientport": 54364,
"message": "<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=147.40.35.17 dst=52.175.54.39 protocol=tcp sport=443 dport=54364 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "52.175.54.39",
"serverIP": "147.40.35.17"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=147.40.35.17 dst=52.175.54.39 protocol=tcp sport=443 dport=54364 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=147.40.35.17 dst=52.175.54.39 protocol=tcp sport=443 dport=54364 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54364
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 52.175.54.39
serverIP: 147.40.35.17
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=5.8.142.42 dst=108.106.161.224 protocol=tcp sport=443 dport=54364 decision=blocked
|
{
"action": "block",
"clientport": 54364,
"message": "<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=5.8.142.42 dst=108.106.161.224 protocol=tcp sport=443 dport=54364 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "108.106.161.224",
"serverIP": "5.8.142.42"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=5.8.142.42 dst=108.106.161.224 protocol=tcp sport=443 dport=54364 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=5.8.142.42 dst=108.106.161.224 protocol=tcp sport=443 dport=54364 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54364
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 108.106.161.224
serverIP: 5.8.142.42
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=133.243.44.53 dst=239.204.156.29 protocol=tcp sport=443 dport=54364 decision=blocked
|
{
"action": "block",
"clientport": 54364,
"message": "<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=133.243.44.53 dst=239.204.156.29 protocol=tcp sport=443 dport=54364 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "239.204.156.29",
"serverIP": "133.243.44.53"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=133.243.44.53 dst=239.204.156.29 protocol=tcp sport=443 dport=54364 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=133.243.44.53 dst=239.204.156.29 protocol=tcp sport=443 dport=54364 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54364
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 239.204.156.29
serverIP: 133.243.44.53
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=138.17.25.101 dst=111.50.108.208 protocol=tcp sport=443 dport=54364 decision=blocked
|
{
"action": "block",
"clientport": 54364,
"message": "<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=138.17.25.101 dst=111.50.108.208 protocol=tcp sport=443 dport=54364 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "111.50.108.208",
"serverIP": "138.17.25.101"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=138.17.25.101 dst=111.50.108.208 protocol=tcp sport=443 dport=54364 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688707750.302956975 NORDC_MX400_1 l7_firewall src=138.17.25.101 dst=111.50.108.208 protocol=tcp sport=443 dport=54364 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54364
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 111.50.108.208
serverIP: 138.17.25.101
|
Explain this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=124.17.230.181 dst=108.26.211.32 protocol=tcp sport=51350 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=124.17.230.181 dst=108.26.211.32 protocol=tcp sport=51350 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51350,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "124.17.230.181",
"serverIP": "108.26.211.32"
}
|
Create a JSON artifact from the message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=124.17.230.181 dst=108.26.211.32 protocol=tcp sport=51350 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=124.17.230.181 dst=108.26.211.32 protocol=tcp sport=51350 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51350
protocol: 6
streamName: meraki_l7_firewall
clientIP: 124.17.230.181
serverIP: 108.26.211.32
|
Explain this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=29.8.89.119 dst=157.9.147.83 protocol=tcp sport=51350 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=29.8.89.119 dst=157.9.147.83 protocol=tcp sport=51350 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51350,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "29.8.89.119",
"serverIP": "157.9.147.83"
}
|
Create a JSON artifact from the message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=29.8.89.119 dst=157.9.147.83 protocol=tcp sport=51350 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=29.8.89.119 dst=157.9.147.83 protocol=tcp sport=51350 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51350
protocol: 6
streamName: meraki_l7_firewall
clientIP: 29.8.89.119
serverIP: 157.9.147.83
|
Explain this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=246.37.54.102 dst=91.210.225.223 protocol=tcp sport=51350 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=246.37.54.102 dst=91.210.225.223 protocol=tcp sport=51350 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51350,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "246.37.54.102",
"serverIP": "91.210.225.223"
}
|
Create a JSON artifact from the message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=246.37.54.102 dst=91.210.225.223 protocol=tcp sport=51350 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=246.37.54.102 dst=91.210.225.223 protocol=tcp sport=51350 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51350
protocol: 6
streamName: meraki_l7_firewall
clientIP: 246.37.54.102
serverIP: 91.210.225.223
|
Explain this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=225.170.171.65 dst=21.206.134.2 protocol=tcp sport=51350 dport=443 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=225.170.171.65 dst=21.206.134.2 protocol=tcp sport=51350 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51350,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "225.170.171.65",
"serverIP": "21.206.134.2"
}
|
Create a JSON artifact from the message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=225.170.171.65 dst=21.206.134.2 protocol=tcp sport=51350 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=162.17.70.250 1 1665749202.404258187 M84_MX67C_Tuscaloosa l7_firewall src=225.170.171.65 dst=21.206.134.2 protocol=tcp sport=51350 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51350
protocol: 6
streamName: meraki_l7_firewall
clientIP: 225.170.171.65
serverIP: 21.206.134.2
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"65.122.145.91","externalIp":"83.176.161.155","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=65.122.145.91 ::: serverIP=83.176.161.155 ::: userName=johndoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-07T18:29:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"65.122.145.91\",\"externalIp\":\"83.176.161.155\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-07T18:29:26.000Z\"} ::: clientIP=65.122.145.91 ::: serverIP=83.176.161.155 ::: userName=johndoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "65.122.145.91",
"serverIP": "83.176.161.155",
"userName": "johndoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"65.122.145.91","externalIp":"83.176.161.155","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=65.122.145.91 ::: serverIP=83.176.161.155 ::: userName=johndoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"65.122.145.91","externalIp":"83.176.161.155","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=65.122.145.91 ::: serverIP=83.176.161.155 ::: userName=johndoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-07T18:29:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 65.122.145.91
serverIP: 83.176.161.155
userName: johndoe
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"136.191.223.49","externalIp":"202.198.94.174","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=136.191.223.49 ::: serverIP=202.198.94.174 ::: userName=fish ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-07T18:29:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"136.191.223.49\",\"externalIp\":\"202.198.94.174\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-07T18:29:26.000Z\"} ::: clientIP=136.191.223.49 ::: serverIP=202.198.94.174 ::: userName=fish ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "136.191.223.49",
"serverIP": "202.198.94.174",
"userName": "fish"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"136.191.223.49","externalIp":"202.198.94.174","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=136.191.223.49 ::: serverIP=202.198.94.174 ::: userName=fish ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"136.191.223.49","externalIp":"202.198.94.174","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=136.191.223.49 ::: serverIP=202.198.94.174 ::: userName=fish ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message:
senderhost: localhost
severitylabel: critical
starttimeutc: 2022-06-07T18:29:26.000Z
tags: ['OpenDNS Detection', 'firewall_action']
productids: [38, 0]
sourceinfo: unknown
sensitivity: normal
serverhostname: imp.onesearch.org
messagetype: firewall_action
severitycode: 2
fqdn: imp.onesearch.org
vendorcode: Search EnginesPotentially HarmfulSearch Engines and Portals
action: block
streamName: OpenDNS Detection
clientIP: 136.191.223.49
serverIP: 202.198.94.174
userName: fish
|
Explain this syslog message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"54.140.107.96","externalIp":"138.255.38.10","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=54.140.107.96 ::: serverIP=138.255.38.10 ::: userName=janedoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
{
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "2022-06-07T18:29:26.000Z",
"tags": [
"OpenDNS Detection",
"firewall_action"
],
"productids": [
38,
0
],
"sourceinfo": "unknown",
"message": "WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"54.140.107.96\",\"externalIp\":\"138.255.38.10\",\"categories\":[\"Search Engines\",\"Potentially Harmful\",\"Search Engines and Portals\"],\"tags\":[],\"destination\":\"imp.onesearch.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-06-07T18:29:26.000Z\"} ::: clientIP=54.140.107.96 ::: serverIP=138.255.38.10 ::: userName=janedoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"serverhostname": "imp.onesearch.org",
"messagetype": "firewall_action",
"severitycode": 2,
"fqdn": "imp.onesearch.org",
"vendorcode": "Search EnginesPotentially HarmfulSearch Engines and Portals",
"action": "block",
"streamName": "OpenDNS Detection",
"clientIP": "54.140.107.96",
"serverIP": "138.255.38.10",
"userName": "janedoe"
}
|
Create a JSON artifact from the message
|
WitFoo-Artifact ::: fqdn=imp.onesearch.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"54.140.107.96","externalIp":"138.255.38.10","categories":["Search Engines","Potentially Harmful","Search Engines and Portals"],"tags":[],"destination":"imp.onesearch.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-06-07T18:29:26.000Z"} ::: clientIP=54.140.107.96 ::: serverIP=138.255.38.10 ::: userName=janedoe ::: created_at=2022-06-07T18:29:26.000Z ::: streamName=OpenDNS Detection ::: vendorCode=Search EnginesPotentially HarmfulSearch Engines and Portals ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-06-07T18:29:26.000Z ::: serverHostname=imp.onesearch.org ::: pipelineEntrypoint=dispatch
|
Product: Umbrella
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.