input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 144.202.41.117
serverIP: 89.174.132.53
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:157.197.246.244/56808 dst dmz-1:249.219.85.9/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:157.197.246.244/56808 dst dmz-1:249.219.85.9/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.197.246.244",
"serverIP": "249.219.85.9"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:157.197.246.244/56808 dst dmz-1:249.219.85.9/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:157.197.246.244/56808 dst dmz-1:249.219.85.9/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 157.197.246.244
serverIP: 249.219.85.9
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:30.121.146.207/56808 dst dmz-1:199.133.252.106/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:30.121.146.207/56808 dst dmz-1:199.133.252.106/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "30.121.146.207",
"serverIP": "199.133.252.106"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:30.121.146.207/56808 dst dmz-1:199.133.252.106/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:30.121.146.207/56808 dst dmz-1:199.133.252.106/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 30.121.146.207
serverIP: 199.133.252.106
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:67.230.93.136/31749 dst dmz-1:208.203.164.150/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:67.230.93.136/31749 dst dmz-1:208.203.164.150/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31749,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.230.93.136",
"serverIP": "208.203.164.150"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:67.230.93.136/31749 dst dmz-1:208.203.164.150/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:67.230.93.136/31749 dst dmz-1:208.203.164.150/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31749
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 67.230.93.136
serverIP: 208.203.164.150
|
Explain this syslog message
|
<132>Oct 20 09:54:57 shareholders drupal: https://shareholders.wayne.com|1697795697|access denied|197.26.139.235|https://shareholders.wayne.com/||0||node/2
|
{
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Oct 20 09:54:57",
"message": "<132>Oct 20 09:54:57 shareholders drupal: https://shareholders.wayne.com|1697795697|access denied|197.26.139.235|https://shareholders.wayne.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1697795697",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "197.26.139.235"
}
|
Create a JSON artifact from the message
|
<132>Oct 20 09:54:57 shareholders drupal: https://shareholders.wayne.com|1697795697|access denied|197.26.139.235|https://shareholders.wayne.com/||0||node/2
|
Product: drupal
Vendor: drupal
|
Identify this syslog message
|
<132>Oct 20 09:54:57 shareholders drupal: https://shareholders.wayne.com|1697795697|access denied|197.26.139.235|https://shareholders.wayne.com/||0||node/2
|
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Oct 20 09:54:57
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1697795697
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 197.26.139.235
|
Explain this syslog message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,23.173.7.189,53.27.72.47,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53126,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:50:59",
"message": "<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,23.173.7.189,53.27.72.47,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 12173,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "23.173.7.189",
"serverIP": "53.27.72.47"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,23.173.7.189,53.27.72.47,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,23.173.7.189,53.27.72.47,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53126
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:50:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 12173
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 23.173.7.189
serverIP: 53.27.72.47
|
Explain this syslog message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,80.102.118.208,84.122.254.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53126,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:50:59",
"message": "<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,80.102.118.208,84.122.254.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 12173,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "80.102.118.208",
"serverIP": "84.122.254.168"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,80.102.118.208,84.122.254.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:50:59 DC1-PA3220-1 1,2023/11/27 10:50:59,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:59,80.102.118.208,84.122.254.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:50:59,0,1,53126,12173,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:55,0,any,,7299323810500224817,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:59.744-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53126
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:50:59
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 12173
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 80.102.118.208
serverIP: 84.122.254.168
|
Explain this syslog message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,181.228.238.47,181.51.25.235,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 65129,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:54:51",
"message": "<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,181.228.238.47,181.51.25.235,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "181.228.238.47",
"serverIP": "181.51.25.235"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,181.228.238.47,181.51.25.235,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,181.228.238.47,181.51.25.235,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 65129
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:54:51
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 181.228.238.47
serverIP: 181.51.25.235
|
Explain this syslog message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,190.160.143.182,22.46.249.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 66,
"clientpackets": 1,
"clientport": 65129,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:54:51",
"message": "<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,190.160.143.182,22.46.249.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3389,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 66,
"streamName": "pan_firewall",
"clientIP": "190.160.143.182",
"serverIP": "22.46.249.145"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,190.160.143.182,22.46.249.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:54:51 DC1-PA3220-1 1,2023/11/27 10:54:51,016201032964,TRAFFIC,drop,2562,2023/11/27 10:54:51,190.160.143.182,22.46.249.145,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:54:51,0,1,65129,3389,0,0,0x0,tcp,deny,66,66,0,1,2023/11/27 10:54:48,0,any,,7299323810500274757,0x0,Panama,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:54:51.689-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 66
clientpackets: 1
clientport: 65129
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:54:51
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3389
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 66
streamName: pan_firewall
clientIP: 190.160.143.182
serverIP: 22.46.249.145
|
Explain this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,253.210.161.65,151.176.74.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54883,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:07:49",
"message": "<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,253.210.161.65,151.176.74.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5491,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "253.210.161.65",
"serverIP": "151.176.74.220"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,253.210.161.65,151.176.74.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,253.210.161.65,151.176.74.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54883
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:07:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5491
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 253.210.161.65
serverIP: 151.176.74.220
|
Explain this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,234.40.217.125,69.21.61.165,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54883,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:07:49",
"message": "<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,234.40.217.125,69.21.61.165,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5491,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "234.40.217.125",
"serverIP": "69.21.61.165"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,234.40.217.125,69.21.61.165,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,234.40.217.125,69.21.61.165,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54883
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:07:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5491
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 234.40.217.125
serverIP: 69.21.61.165
|
Explain this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,40.81.117.7,146.214.15.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:40:40",
"message": "<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,40.81.117.7,146.214.15.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 20046,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "40.81.117.7",
"serverIP": "146.214.15.9"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,40.81.117.7,146.214.15.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,40.81.117.7,146.214.15.9,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:40:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 20046
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 40.81.117.7
serverIP: 146.214.15.9
|
Explain this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,109.253.197.120,107.190.78.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:40:40",
"message": "<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,109.253.197.120,107.190.78.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 20046,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "109.253.197.120",
"serverIP": "107.190.78.247"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,109.253.197.120,107.190.78.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,109.253.197.120,107.190.78.247,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:40:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 20046
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 109.253.197.120
serverIP: 107.190.78.247
|
Explain this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,20.221.67.14,17.198.41.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:36:18",
"message": "<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,20.221.67.14,17.198.41.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18921,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "20.221.67.14",
"serverIP": "17.198.41.71"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,20.221.67.14,17.198.41.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,20.221.67.14,17.198.41.71,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:36:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18921
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 20.221.67.14
serverIP: 17.198.41.71
|
Explain this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,196.65.4.239,9.229.156.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:36:18",
"message": "<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,196.65.4.239,9.229.156.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18921,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "196.65.4.239",
"serverIP": "9.229.156.124"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,196.65.4.239,9.229.156.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,196.65.4.239,9.229.156.124,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:36:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18921
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 196.65.4.239
serverIP: 9.229.156.124
|
Explain this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,194.26.117.184,201.86.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:36:18",
"message": "<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,194.26.117.184,201.86.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 18921,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "194.26.117.184",
"serverIP": "201.86.176.240"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,194.26.117.184,201.86.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:36:18 DC1-PA3220-1 1,2023/11/27 10:36:18,016201032964,TRAFFIC,drop,2562,2023/11/27 10:36:18,194.26.117.184,201.86.176.240,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:36:18,0,1,53209,18921,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:36:14,0,any,,7299323810499962643,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:36:18.339-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:36:18
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 18921
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 194.26.117.184
serverIP: 201.86.176.240
|
Explain this syslog message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,218.22.92.222,182.22.172.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53106,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:50:14",
"message": "<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,218.22.92.222,182.22.172.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8158,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "218.22.92.222",
"serverIP": "182.22.172.53"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,218.22.92.222,182.22.172.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,218.22.92.222,182.22.172.53,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53106
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:50:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8158
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 218.22.92.222
serverIP: 182.22.172.53
|
Explain this syslog message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,21.84.59.239,88.208.127.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53106,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:50:14",
"message": "<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,21.84.59.239,88.208.127.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8158,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "21.84.59.239",
"serverIP": "88.208.127.253"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,21.84.59.239,88.208.127.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:50:14 DC1-PA3220-1 1,2023/11/27 10:50:14,016201032964,TRAFFIC,drop,2562,2023/11/27 10:50:14,21.84.59.239,88.208.127.253,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:50:14,0,1,53106,8158,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:50:11,0,any,,7299323810500209519,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:50:14.474-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53106
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:50:14
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8158
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 21.84.59.239
serverIP: 88.208.127.253
|
Explain this syslog message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,65.72.109.71,7.105.103.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54662,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:56:26",
"message": "<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,65.72.109.71,7.105.103.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 46521,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "65.72.109.71",
"serverIP": "7.105.103.198"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,65.72.109.71,7.105.103.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,65.72.109.71,7.105.103.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54662
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:56:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 46521
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 65.72.109.71
serverIP: 7.105.103.198
|
Explain this syslog message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,16.239.121.95,75.49.217.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54662,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:56:26",
"message": "<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,16.239.121.95,75.49.217.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 46521,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "16.239.121.95",
"serverIP": "75.49.217.148"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,16.239.121.95,75.49.217.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:56:26 DC1-PA3220-1 1,2023/11/27 10:56:25,016201032964,TRAFFIC,drop,2562,2023/11/27 10:56:25,16.239.121.95,75.49.217.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:56:25,0,1,54662,46521,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:56:22,0,any,,7299323810500289222,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:56:26.268-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54662
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:56:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 46521
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 16.239.121.95
serverIP: 75.49.217.148
|
Explain this syslog message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,98.20.237.55,72.132.178.188,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45995,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:16:57",
"message": "<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,98.20.237.55,72.132.178.188,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2726,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "98.20.237.55",
"serverIP": "72.132.178.188"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,98.20.237.55,72.132.178.188,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,98.20.237.55,72.132.178.188,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45995
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:16:57
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2726
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 98.20.237.55
serverIP: 72.132.178.188
|
Explain this syslog message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,118.219.115.132,62.69.9.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45995,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:16:57",
"message": "<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,118.219.115.132,62.69.9.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2726,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "118.219.115.132",
"serverIP": "62.69.9.206"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,118.219.115.132,62.69.9.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:16:57 DC1-PA3220-1 1,2023/11/27 11:16:57,016201032964,TRAFFIC,drop,2562,2023/11/27 11:16:57,118.219.115.132,62.69.9.206,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:16:57,0,1,45995,2726,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:16:54,0,any,,7299323810500605446,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:16:57.857-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45995
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:16:57
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2726
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 118.219.115.132
serverIP: 62.69.9.206
|
Explain this syslog message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,255.240.23.40,121.9.101.237,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53106,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:18:47",
"message": "<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,255.240.23.40,121.9.101.237,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7734,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "255.240.23.40",
"serverIP": "121.9.101.237"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,255.240.23.40,121.9.101.237,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,255.240.23.40,121.9.101.237,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53106
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:18:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7734
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 255.240.23.40
serverIP: 121.9.101.237
|
Explain this syslog message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,191.207.115.218,154.243.70.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53106,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:18:47",
"message": "<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,191.207.115.218,154.243.70.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 7734,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "191.207.115.218",
"serverIP": "154.243.70.77"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,191.207.115.218,154.243.70.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:18:47 DC1-PA3220-1 1,2023/11/27 11:18:47,016201032964,TRAFFIC,drop,2562,2023/11/27 11:18:47,191.207.115.218,154.243.70.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:18:47,0,1,53106,7734,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:18:44,0,any,,7299323810500641780,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:18:47.820-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53106
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:18:47
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 7734
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 191.207.115.218
serverIP: 154.243.70.77
|
Explain this syslog message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,139.129.236.143,11.240.178.64,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 64,
"clientpackets": 1,
"clientport": 58045,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:51:36",
"message": "<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,139.129.236.143,11.240.178.64,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 950,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 64,
"streamName": "pan_firewall",
"clientIP": "139.129.236.143",
"serverIP": "11.240.178.64"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,139.129.236.143,11.240.178.64,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,139.129.236.143,11.240.178.64,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 64
clientpackets: 1
clientport: 58045
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:51:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 950
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 64
streamName: pan_firewall
clientIP: 139.129.236.143
serverIP: 11.240.178.64
|
Explain this syslog message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,167.7.140.229,203.89.87.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 64,
"clientpackets": 1,
"clientport": 58045,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:51:36",
"message": "<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,167.7.140.229,203.89.87.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 950,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 64,
"streamName": "pan_firewall",
"clientIP": "167.7.140.229",
"serverIP": "203.89.87.105"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,167.7.140.229,203.89.87.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:51:36 DC1-PA3220-1 1,2023/11/27 10:51:36,016201032964,TRAFFIC,drop,2562,2023/11/27 10:51:36,167.7.140.229,203.89.87.105,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ae3.650,,Witfoo Log Forward Only,2023/11/27 10:51:36,0,1,58045,950,0,0,0x0,tcp,deny,64,64,0,1,2023/11/27 10:51:33,0,any,,7299323810500236976,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:51:36.687-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 64
clientpackets: 1
clientport: 58045
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:51:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 950
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 64
streamName: pan_firewall
clientIP: 167.7.140.229
serverIP: 203.89.87.105
|
Explain this syslog message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,143.127.64.226,207.130.150.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35875,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:26:41",
"message": "<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,143.127.64.226,207.130.150.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "143.127.64.226",
"serverIP": "207.130.150.32"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,143.127.64.226,207.130.150.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,143.127.64.226,207.130.150.32,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35875
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:26:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 143.127.64.226
serverIP: 207.130.150.32
|
Explain this syslog message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,245.37.185.31,45.40.174.176,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35875,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:26:41",
"message": "<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,245.37.185.31,45.40.174.176,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "245.37.185.31",
"serverIP": "45.40.174.176"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,245.37.185.31,45.40.174.176,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:26:41 DC1-PA3220-1 1,2023/11/27 11:26:40,016201032964,TRAFFIC,drop,2562,2023/11/27 11:26:40,245.37.185.31,45.40.174.176,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:26:40,0,1,35875,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:26:37,0,any,,7299323810500771922,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:26:41.392-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35875
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:26:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 245.37.185.31
serverIP: 45.40.174.176
|
Explain this syslog message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,159.105.18.35,80.212.99.13,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 53055,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:52:22",
"message": "<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,159.105.18.35,80.212.99.13,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 46128,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "80.212.99.13",
"serverIP": "159.105.18.35"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,159.105.18.35,80.212.99.13,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,159.105.18.35,80.212.99.13,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 53055
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:52:22
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 46128
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 80.212.99.13
serverIP: 159.105.18.35
|
Explain this syslog message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,181.220.158.247,23.188.114.82,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 53055,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:52:22",
"message": "<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,181.220.158.247,23.188.114.82,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 46128,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "23.188.114.82",
"serverIP": "181.220.158.247"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,181.220.158.247,23.188.114.82,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:52:22 DC1-PA3220-1 1,2023/11/27 10:52:22,016201032964,TRAFFIC,drop,2562,2023/11/27 10:52:22,181.220.158.247,23.188.114.82,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 10:52:22,0,1,46128,53055,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:52:18,0,any,,7299323810500250259,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:52:22.745-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 53055
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:52:22
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 46128
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 23.188.114.82
serverIP: 181.220.158.247
|
Explain this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,161.245.107.96,136.108.125.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54883,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:07:49",
"message": "<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,161.245.107.96,136.108.125.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5491,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "161.245.107.96",
"serverIP": "136.108.125.94"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,161.245.107.96,136.108.125.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,161.245.107.96,136.108.125.94,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54883
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:07:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5491
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 161.245.107.96
serverIP: 136.108.125.94
|
Explain this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,59.173.171.62,75.191.74.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 54883,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 11:07:49",
"message": "<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,59.173.171.62,75.191.74.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5491,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "59.173.171.62",
"serverIP": "75.191.74.69"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,59.173.171.62,75.191.74.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 11:07:49 DC1-PA3220-1 1,2023/11/27 11:07:49,016201032964,TRAFFIC,drop,2562,2023/11/27 11:07:49,59.173.171.62,75.191.74.69,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/11/27 11:07:49,0,1,54883,5491,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 11:07:46,0,any,,7299323810500440592,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T11:07:49.792-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 54883
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 11:07:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5491
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 59.173.171.62
serverIP: 75.191.74.69
|
Explain this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,152.125.126.165,25.230.38.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:40:40",
"message": "<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,152.125.126.165,25.230.38.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 20046,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "152.125.126.165",
"serverIP": "25.230.38.79"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,152.125.126.165,25.230.38.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,152.125.126.165,25.230.38.79,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53209
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Nov 27 10:40:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 20046
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 152.125.126.165
serverIP: 25.230.38.79
|
Explain this syslog message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,90.7.195.118,36.135.2.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53209,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Nov 27 10:40:40",
"message": "<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,90.7.195.118,36.135.2.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 20046,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "90.7.195.118",
"serverIP": "36.135.2.141"
}
|
Create a JSON artifact from the message
|
<14>Nov 27 10:40:40 DC1-PA3220-1 1,2023/11/27 10:40:40,016201032964,TRAFFIC,drop,2562,2023/11/27 10:40:40,90.7.195.118,36.135.2.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/11/27 10:40:40,0,1,53209,20046,0,0,0x0,tcp,deny,60,60,0,1,2023/11/27 10:40:37,0,any,,7299323810500007398,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-11-27T10:40:40.375-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.