input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=46.170.92.91 dst=195.199.131.177 protocol=tcp sport=80 dport=23848 decision=blocked
|
{
"action": "block",
"clientport": 23848,
"message": "<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=46.170.92.91 dst=195.199.131.177 protocol=tcp sport=80 dport=23848 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "195.199.131.177",
"serverIP": "46.170.92.91"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=46.170.92.91 dst=195.199.131.177 protocol=tcp sport=80 dport=23848 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105643.659267911 NORDC_MX400_1 l7_firewall src=46.170.92.91 dst=195.199.131.177 protocol=tcp sport=80 dport=23848 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 23848
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 195.199.131.177
serverIP: 46.170.92.91
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=182.140.232.126 dst=43.106.115.190 protocol=tcp sport=80 dport=8436 decision=blocked
|
{
"action": "block",
"clientport": 8436,
"message": "<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=182.140.232.126 dst=43.106.115.190 protocol=tcp sport=80 dport=8436 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "43.106.115.190",
"serverIP": "182.140.232.126"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=182.140.232.126 dst=43.106.115.190 protocol=tcp sport=80 dport=8436 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=182.140.232.126 dst=43.106.115.190 protocol=tcp sport=80 dport=8436 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 8436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 43.106.115.190
serverIP: 182.140.232.126
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=246.6.107.9 dst=243.237.165.15 protocol=tcp sport=80 dport=8436 decision=blocked
|
{
"action": "block",
"clientport": 8436,
"message": "<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=246.6.107.9 dst=243.237.165.15 protocol=tcp sport=80 dport=8436 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "243.237.165.15",
"serverIP": "246.6.107.9"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=246.6.107.9 dst=243.237.165.15 protocol=tcp sport=80 dport=8436 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=246.6.107.9 dst=243.237.165.15 protocol=tcp sport=80 dport=8436 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 8436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 243.237.165.15
serverIP: 246.6.107.9
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=59.202.77.83 dst=63.193.236.159 protocol=tcp sport=80 dport=8436 decision=blocked
|
{
"action": "block",
"clientport": 8436,
"message": "<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=59.202.77.83 dst=63.193.236.159 protocol=tcp sport=80 dport=8436 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "63.193.236.159",
"serverIP": "59.202.77.83"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=59.202.77.83 dst=63.193.236.159 protocol=tcp sport=80 dport=8436 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=59.202.77.83 dst=63.193.236.159 protocol=tcp sport=80 dport=8436 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 8436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 63.193.236.159
serverIP: 59.202.77.83
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=93.188.89.221 dst=65.187.3.115 protocol=tcp sport=80 dport=8436 decision=blocked
|
{
"action": "block",
"clientport": 8436,
"message": "<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=93.188.89.221 dst=65.187.3.115 protocol=tcp sport=80 dport=8436 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 80,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "65.187.3.115",
"serverIP": "93.188.89.221"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=93.188.89.221 dst=65.187.3.115 protocol=tcp sport=80 dport=8436 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1688105639.659368583 NORDC_MX400_1 l7_firewall src=93.188.89.221 dst=65.187.3.115 protocol=tcp sport=80 dport=8436 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 8436
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 80
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 65.187.3.115
serverIP: 93.188.89.221
|
Explain this syslog message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,239.84.230.87,91.42.164.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49475,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:23:32",
"message": "<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,239.84.230.87,91.42.164.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4585,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "239.84.230.87",
"serverIP": "91.42.164.7"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,239.84.230.87,91.42.164.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,239.84.230.87,91.42.164.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49475
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:23:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4585
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 239.84.230.87
serverIP: 91.42.164.7
|
Explain this syslog message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,214.222.223.169,228.148.150.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49475,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:23:32",
"message": "<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,214.222.223.169,228.148.150.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4585,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "214.222.223.169",
"serverIP": "228.148.150.250"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,214.222.223.169,228.148.150.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:23:32 DC1-PA3220-1 1,2023/08/16 01:23:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:32,214.222.223.169,228.148.150.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:32,0,1,49475,4585,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:31,0,any,,7263933889813604584,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:32.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49475
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:23:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4585
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 214.222.223.169
serverIP: 228.148.150.250
|
Explain this syslog message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,66.155.28.117,245.219.2.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49568,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:23:20",
"message": "<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,66.155.28.117,245.219.2.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4727,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "66.155.28.117",
"serverIP": "245.219.2.53"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,66.155.28.117,245.219.2.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,66.155.28.117,245.219.2.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49568
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:23:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4727
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 66.155.28.117
serverIP: 245.219.2.53
|
Explain this syslog message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,159.231.112.45,246.247.239.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49568,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:23:20",
"message": "<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,159.231.112.45,246.247.239.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4727,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "159.231.112.45",
"serverIP": "246.247.239.242"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,159.231.112.45,246.247.239.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:23:20 DC1-PA3220-1 1,2023/08/16 01:23:20,016201032964,TRAFFIC,drop,2562,2023/08/16 01:23:20,159.231.112.45,246.247.239.242,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:23:20,0,1,49568,4727,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:23:19,0,any,,7263933889813603516,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:23:20.331-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49568
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:23:20
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4727
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 159.231.112.45
serverIP: 246.247.239.242
|
Explain this syslog message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,133.27.60.51,39.194.159.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48477,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:32",
"message": "<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,133.27.60.51,39.194.159.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 102,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "133.27.60.51",
"serverIP": "39.194.159.166"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,133.27.60.51,39.194.159.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,133.27.60.51,39.194.159.166,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48477
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 102
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 133.27.60.51
serverIP: 39.194.159.166
|
Explain this syslog message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,11.228.34.185,79.210.110.183,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48477,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:32",
"message": "<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,11.228.34.185,79.210.110.183,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 102,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "11.228.34.185",
"serverIP": "79.210.110.183"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,11.228.34.185,79.210.110.183,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:32 DC1-PA3220-1 1,2023/08/16 01:29:32,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:32,11.228.34.185,79.210.110.183,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:32,0,1,48477,102,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:31,0,any,,7263933889813636152,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:32.427-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48477
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 102
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 11.228.34.185
serverIP: 79.210.110.183
|
Explain this syslog message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,236.41.51.80,79.57.131.2,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52819,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:21:10",
"message": "<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,236.41.51.80,79.57.131.2,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8291,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "236.41.51.80",
"serverIP": "79.57.131.2"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,236.41.51.80,79.57.131.2,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,236.41.51.80,79.57.131.2,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52819
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:21:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8291
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 236.41.51.80
serverIP: 79.57.131.2
|
Explain this syslog message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,66.13.239.139,52.131.104.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52819,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:21:10",
"message": "<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,66.13.239.139,52.131.104.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8291,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "66.13.239.139",
"serverIP": "52.131.104.73"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,66.13.239.139,52.131.104.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:21:10 DC1-PA3220-1 1,2023/08/16 01:21:10,016201032964,TRAFFIC,drop,2562,2023/08/16 01:21:10,66.13.239.139,52.131.104.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:21:10,0,1,52819,8291,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:21:10,0,any,,7263933889813592087,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:21:10.941-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52819
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:21:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8291
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 66.13.239.139
serverIP: 52.131.104.73
|
Explain this syslog message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,107.12.53.64,220.10.5.159,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55464,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:28:55",
"message": "<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,107.12.53.64,220.10.5.159,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8899,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "107.12.53.64",
"serverIP": "220.10.5.159"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,107.12.53.64,220.10.5.159,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,107.12.53.64,220.10.5.159,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55464
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:28:55
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8899
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 107.12.53.64
serverIP: 220.10.5.159
|
Explain this syslog message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,59.192.29.89,9.66.161.92,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 55464,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:28:55",
"message": "<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,59.192.29.89,9.66.161.92,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8899,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "59.192.29.89",
"serverIP": "9.66.161.92"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,59.192.29.89,9.66.161.92,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:28:55 DC1-PA3220-1 1,2023/08/16 01:28:55,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:55,59.192.29.89,9.66.161.92,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:55,0,1,55464,8899,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:54,0,any,,7263933889813632991,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:55.446-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 55464
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:28:55
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8899
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 59.192.29.89
serverIP: 9.66.161.92
|
Explain this syslog message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,232.245.12.237,234.230.75.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49462,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:22:56",
"message": "<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,232.245.12.237,234.230.75.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4400,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "232.245.12.237",
"serverIP": "234.230.75.250"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,232.245.12.237,234.230.75.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,232.245.12.237,234.230.75.250,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49462
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:22:56
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4400
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 232.245.12.237
serverIP: 234.230.75.250
|
Explain this syslog message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,83.35.150.98,216.151.132.228,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49462,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:22:56",
"message": "<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,83.35.150.98,216.151.132.228,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4400,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "83.35.150.98",
"serverIP": "216.151.132.228"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,83.35.150.98,216.151.132.228,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:22:56 DC1-PA3220-1 1,2023/08/16 01:22:56,016201032964,TRAFFIC,drop,2562,2023/08/16 01:22:56,83.35.150.98,216.151.132.228,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:22:56,0,1,49462,4400,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:22:54,0,any,,7263933889813601368,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:22:56.443-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49462
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:22:56
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4400
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 83.35.150.98
serverIP: 216.151.132.228
|
Explain this syslog message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,50.56.18.157,61.202.209.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48349,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:27:29",
"message": "<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,50.56.18.157,61.202.209.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "50.56.18.157",
"serverIP": "61.202.209.137"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,50.56.18.157,61.202.209.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,50.56.18.157,61.202.209.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48349
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:27:29
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 50.56.18.157
serverIP: 61.202.209.137
|
Explain this syslog message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,30.40.202.133,139.178.53.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 48349,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:27:29",
"message": "<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,30.40.202.133,139.178.53.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "30.40.202.133",
"serverIP": "139.178.53.32"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,30.40.202.133,139.178.53.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:27:29 DC1-PA3220-1 1,2023/08/16 01:27:29,016201032964,TRAFFIC,drop,2562,2023/08/16 01:27:29,30.40.202.133,139.178.53.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:27:29,0,1,48349,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:27:27,0,any,,7263933889813625569,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:27:29.444-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 48349
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:27:29
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 30.40.202.133
serverIP: 139.178.53.32
|
Explain this syslog message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,4.207.217.230,144.167.29.22,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52654,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:31:24",
"message": "<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,4.207.217.230,144.167.29.22,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 28398,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "4.207.217.230",
"serverIP": "144.167.29.22"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,4.207.217.230,144.167.29.22,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,4.207.217.230,144.167.29.22,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52654
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:31:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 28398
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 4.207.217.230
serverIP: 144.167.29.22
|
Explain this syslog message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,190.254.75.27,67.196.132.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52654,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:31:24",
"message": "<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,190.254.75.27,67.196.132.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 28398,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "190.254.75.27",
"serverIP": "67.196.132.218"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,190.254.75.27,67.196.132.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:31:24 DC1-PA3220-1 1,2023/08/16 01:31:24,016201032964,TRAFFIC,drop,2562,2023/08/16 01:31:24,190.254.75.27,67.196.132.218,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:31:24,0,1,52654,28398,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:31:22,0,any,,7263933889813645805,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:31:24.465-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52654
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:31:24
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 28398
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 190.254.75.27
serverIP: 67.196.132.218
|
Explain this syslog message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,159.77.238.126,22.153.228.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 24963,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:28:43",
"message": "<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,159.77.238.126,22.153.228.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "159.77.238.126",
"serverIP": "22.153.228.138"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,159.77.238.126,22.153.228.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,159.77.238.126,22.153.228.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 24963
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:28:43
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 159.77.238.126
serverIP: 22.153.228.138
|
Explain this syslog message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,100.12.40.44,198.155.116.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 24963,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:28:43",
"message": "<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,100.12.40.44,198.155.116.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "100.12.40.44",
"serverIP": "198.155.116.99"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,100.12.40.44,198.155.116.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:28:43 DC1-PA3220-1 1,2023/08/16 01:28:43,016201032964,TRAFFIC,drop,2562,2023/08/16 01:28:43,100.12.40.44,198.155.116.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:28:43,0,1,24963,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:28:41,0,any,,7263933889813631994,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:28:43.445-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 24963
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:28:43
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 100.12.40.44
serverIP: 198.155.116.99
|
Explain this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,231.198.15.32,231.1.204.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:48",
"message": "<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,231.198.15.32,231.1.204.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 1027,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "231.198.15.32",
"serverIP": "231.1.204.48"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,231.198.15.32,231.1.204.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,231.198.15.32,231.1.204.48,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:48
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 1027
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 231.198.15.32
serverIP: 231.1.204.48
|
Explain this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,212.44.72.232,179.96.148.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58914,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:48",
"message": "<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,212.44.72.232,179.96.148.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 1027,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "212.44.72.232",
"serverIP": "179.96.148.81"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,212.44.72.232,179.96.148.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,212.44.72.232,179.96.148.81,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,58914,1027,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:46,0,any,,7263933889813637497,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58914
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:48
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 1027
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 212.44.72.232
serverIP: 179.96.148.81
|
Explain this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,70.113.69.90,72.207.35.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43198,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:48",
"message": "<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,70.113.69.90,72.207.35.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "70.113.69.90",
"serverIP": "72.207.35.86"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,70.113.69.90,72.207.35.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,70.113.69.90,72.207.35.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43198
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:48
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 70.113.69.90
serverIP: 72.207.35.86
|
Explain this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,168.29.255.6,152.164.85.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 43198,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:29:48",
"message": "<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,168.29.255.6,152.164.85.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 81,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "168.29.255.6",
"serverIP": "152.164.85.116"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,168.29.255.6,152.164.85.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:29:48 DC1-PA3220-1 1,2023/08/16 01:29:48,016201032964,TRAFFIC,drop,2562,2023/08/16 01:29:48,168.29.255.6,152.164.85.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:29:48,0,1,43198,81,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:29:47,0,any,,7263933889813637500,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:29:48.430-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 43198
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:29:48
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 81
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 168.29.255.6
serverIP: 152.164.85.116
|
Explain this syslog message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,49.74.9.40,101.74.223.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 10343,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:35:28",
"message": "<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,49.74.9.40,101.74.223.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "49.74.9.40",
"serverIP": "101.74.223.23"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,49.74.9.40,101.74.223.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,49.74.9.40,101.74.223.23,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 10343
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:35:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 49.74.9.40
serverIP: 101.74.223.23
|
Explain this syslog message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,126.223.135.239,28.86.47.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 10343,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:35:28",
"message": "<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,126.223.135.239,28.86.47.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "126.223.135.239",
"serverIP": "28.86.47.107"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,126.223.135.239,28.86.47.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:35:28 DC1-PA3220-1 1,2023/08/16 01:35:28,016201032964,TRAFFIC,drop,2562,2023/08/16 01:35:28,126.223.135.239,28.86.47.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:35:28,0,1,10343,23,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:35:26,0,any,,7263933889813666698,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:35:28.220-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 10343
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:35:28
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 126.223.135.239
serverIP: 28.86.47.107
|
Explain this syslog message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,132.156.65.174,248.147.83.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49656,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:45:07",
"message": "<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,132.156.65.174,248.147.83.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 33564,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "132.156.65.174",
"serverIP": "248.147.83.145"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,132.156.65.174,248.147.83.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,132.156.65.174,248.147.83.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49656
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:45:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 33564
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 132.156.65.174
serverIP: 248.147.83.145
|
Explain this syslog message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,70.20.113.228,234.228.53.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49656,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:45:07",
"message": "<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,70.20.113.228,234.228.53.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 33564,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "70.20.113.228",
"serverIP": "234.228.53.60"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,70.20.113.228,234.228.53.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:45:07 DC1-PA3220-1 1,2023/08/16 01:45:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:45:07,70.20.113.228,234.228.53.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:45:07,0,1,49656,33564,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:45:06,0,any,,7263933889813717444,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:45:07.735-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49656
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:45:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 33564
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 70.20.113.228
serverIP: 234.228.53.60
|
Explain this syslog message
|
<14>Aug 16 01:46:07 DC1-PA3220-1 1,2023/08/16 01:46:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:46:07,121.213.56.213,124.239.191.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:46:07,0,1,49546,4913,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:46:05,0,any,,7263933889813722639,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:46:07.235-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 49546,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Aug 16 01:46:07",
"message": "<14>Aug 16 01:46:07 DC1-PA3220-1 1,2023/08/16 01:46:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:46:07,121.213.56.213,124.239.191.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:46:07,0,1,49546,4913,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:46:05,0,any,,7263933889813722639,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:46:07.235-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 4913,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "121.213.56.213",
"serverIP": "124.239.191.57"
}
|
Create a JSON artifact from the message
|
<14>Aug 16 01:46:07 DC1-PA3220-1 1,2023/08/16 01:46:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:46:07,121.213.56.213,124.239.191.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:46:07,0,1,49546,4913,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:46:05,0,any,,7263933889813722639,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:46:07.235-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Aug 16 01:46:07 DC1-PA3220-1 1,2023/08/16 01:46:07,016201032964,TRAFFIC,drop,2562,2023/08/16 01:46:07,121.213.56.213,124.239.191.57,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/08/16 01:46:07,0,1,49546,4913,0,0,0x0,tcp,deny,60,60,0,1,2023/08/16 01:46:05,0,any,,7263933889813722639,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-08-16T01:46:07.235-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 49546
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Aug 16 01:46:07
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 4913
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 121.213.56.213
serverIP: 124.239.191.57
|
Explain this syslog message
|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.129.141.202 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.21.56.219 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.21.56.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 53876,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg",
"localhostname": "WAFirewall",
"localstarttime": "1694388472700 ",
"message": "<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.129.141.202 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=230.21.56.219 spt=53876 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.21.56.219 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:122.225.130.85",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "230.21.56.219",
"serverIP": "74.129.141.202",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.129.141.202 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.21.56.219 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.21.56.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=74.129.141.202 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=230.21.56.219 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=230.21.56.219 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 53876
facilitycode: 23
facilitylabel: local7
fqdn: /servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg
localhostname: WAFirewall
localstarttime: 1694388472700
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['ProxyIP:122.225.130.85', 'RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 230.21.56.219
serverIP: 74.129.141.202
userName: -
|
Explain this syslog message
|
<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=128.103.41.159 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=169.183.52.15 spt=53876 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication="Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.183.52.15 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"action": "block",
"clientport": 53876,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg",
"localhostname": "WAFirewall",
"localstarttime": "1694388472700 ",
"message": "<185>Sep 10 18:27:52 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=128.103.41.159 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=169.183.52.15 spt=53876 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 10 2023 18:27:52 rt=1694388472700 request=/servlet/eAndar.WebFileLibrary/39/3639383035/Tattered%20Torn%20Tornado%20Picture.jpg requestClientApplication=\"Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18a816c4b4c-1eba0489 cn2=53876 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=169.183.52.15 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"ProxyIP:122.225.130.85",
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "169.183.52.15",
"serverIP": "128.103.41.159",
"userName": "-"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.