input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Dec 21 16:33:08 DC1-PA3220-1 1,2023/12/21 16:33:08,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:08,189.206.255.188,114.55.197.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:08,0,1,44929,445,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:04,0,any,,7299323810766383016,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:08.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44929
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 189.206.255.188
serverIP: 114.55.197.164
|
Explain this syslog message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,134.17.195.223,132.221.29.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 59681,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:36",
"message": "<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,134.17.195.223,132.221.29.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "134.17.195.223",
"serverIP": "132.221.29.138"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,134.17.195.223,132.221.29.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,134.17.195.223,132.221.29.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 59681
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 134.17.195.223
serverIP: 132.221.29.138
|
Explain this syslog message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,7.13.9.210,4.205.183.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 59681,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:36",
"message": "<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,7.13.9.210,4.205.183.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "7.13.9.210",
"serverIP": "4.205.183.102"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,7.13.9.210,4.205.183.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:36 DC1-PA3220-1 1,2023/12/21 16:33:36,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:36,7.13.9.210,4.205.183.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:36,0,1,59681,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:33:33,0,any,,7299323810766385895,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:36.650-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 59681
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 7.13.9.210
serverIP: 4.205.183.102
|
Explain this syslog message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,137.155.151.164,212.87.113.203,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 34092,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:54",
"message": "<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,137.155.151.164,212.87.113.203,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "137.155.151.164",
"serverIP": "212.87.113.203"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,137.155.151.164,212.87.113.203,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,137.155.151.164,212.87.113.203,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 34092
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:54
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 137.155.151.164
serverIP: 212.87.113.203
|
Explain this syslog message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,5.22.118.234,107.65.244.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 34092,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:54",
"message": "<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,5.22.118.234,107.65.244.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 22,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "5.22.118.234",
"serverIP": "107.65.244.230"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,5.22.118.234,107.65.244.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:54 DC1-PA3220-1 1,2023/12/21 16:35:54,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:54,5.22.118.234,107.65.244.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:54,0,1,34092,22,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:50,0,any,,7299323810766398881,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:54.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 34092
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:54
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 22
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 5.22.118.234
serverIP: 107.65.244.230
|
Explain this syslog message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,183.183.105.39,162.230.103.246,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 38565,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:40:09",
"message": "<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,183.183.105.39,162.230.103.246,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "183.183.105.39",
"serverIP": "162.230.103.246"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,183.183.105.39,162.230.103.246,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,183.183.105.39,162.230.103.246,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 38565
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:40:09
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 183.183.105.39
serverIP: 162.230.103.246
|
Explain this syslog message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,192.183.49.25,231.23.172.56,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 38565,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:40:09",
"message": "<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,192.183.49.25,231.23.172.56,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "192.183.49.25",
"serverIP": "231.23.172.56"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,192.183.49.25,231.23.172.56,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:40:09 DC1-PA3220-1 1,2023/12/21 16:40:09,016201032964,TRAFFIC,drop,2562,2023/12/21 16:40:09,192.183.49.25,231.23.172.56,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:40:09,0,1,38565,23,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:40:06,0,any,,7299323810766423287,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:40:09.719-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 38565
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:40:09
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 192.183.49.25
serverIP: 231.23.172.56
|
Explain this syslog message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,108.153.184.17,246.213.61.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56603,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:26",
"message": "<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,108.153.184.17,246.213.61.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3329,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "108.153.184.17",
"serverIP": "246.213.61.1"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,108.153.184.17,246.213.61.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,108.153.184.17,246.213.61.1,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56603
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3329
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 108.153.184.17
serverIP: 246.213.61.1
|
Explain this syslog message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,32.27.168.210,12.31.121.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 56603,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:26",
"message": "<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,32.27.168.210,12.31.121.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3329,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "32.27.168.210",
"serverIP": "12.31.121.214"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,32.27.168.210,12.31.121.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:26 DC1-PA3220-1 1,2023/12/21 16:33:26,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:26,32.27.168.210,12.31.121.214,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:26,0,1,56603,3329,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:22,0,any,,7299323810766384874,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:26.710-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 56603
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3329
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 32.27.168.210
serverIP: 12.31.121.214
|
Explain this syslog message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,27.54.73.134,220.190.163.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 16472,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:13",
"message": "<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,27.54.73.134,220.190.163.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "27.54.73.134",
"serverIP": "220.190.163.154"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,27.54.73.134,220.190.163.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,27.54.73.134,220.190.163.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 16472
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 27.54.73.134
serverIP: 220.190.163.154
|
Explain this syslog message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,89.163.80.222,219.201.202.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 16472,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:33:13",
"message": "<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,89.163.80.222,219.201.202.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "89.163.80.222",
"serverIP": "219.201.202.248"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,89.163.80.222,219.201.202.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:33:13 DC1-PA3220-1 1,2023/12/21 16:33:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:33:13,89.163.80.222,219.201.202.248,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:33:13,0,1,16472,80,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:33:10,0,any,,7299323810766383493,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:33:13.612-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 16472
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:33:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 89.163.80.222
serverIP: 219.201.202.248
|
Explain this syslog message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,159.87.236.187,72.71.253.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:06",
"message": "<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,159.87.236.187,72.71.253.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "159.87.236.187",
"serverIP": "72.71.253.152"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,159.87.236.187,72.71.253.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,159.87.236.187,72.71.253.152,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 159.87.236.187
serverIP: 72.71.253.152
|
Explain this syslog message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,95.106.143.145,118.104.118.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:06",
"message": "<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,95.106.143.145,118.104.118.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "95.106.143.145",
"serverIP": "118.104.118.60"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,95.106.143.145,118.104.118.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:06 DC1-PA3220-1 1,2023/12/21 16:37:06,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:06,95.106.143.145,118.104.118.60,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:06,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:03,0,any,,7299323810766406149,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:06.712-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 95.106.143.145
serverIP: 118.104.118.60
|
Explain this syslog message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,227.171.132.32,222.212.62.190,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:36:41",
"message": "<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,227.171.132.32,222.212.62.190,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "227.171.132.32",
"serverIP": "222.212.62.190"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,227.171.132.32,222.212.62.190,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,227.171.132.32,222.212.62.190,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:36:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 227.171.132.32
serverIP: 222.212.62.190
|
Explain this syslog message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,68.180.66.221,159.56.72.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:36:41",
"message": "<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,68.180.66.221,159.56.72.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "68.180.66.221",
"serverIP": "159.56.72.100"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,68.180.66.221,159.56.72.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:36:41 DC1-PA3220-1 1,2023/12/21 16:36:41,016201032964,TRAFFIC,drop,2562,2023/12/21 16:36:41,68.180.66.221,159.56.72.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:36:41,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:36:38,0,any,,7299323810766403245,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:36:41.652-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:36:41
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 68.180.66.221
serverIP: 159.56.72.100
|
Explain this syslog message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,176.218.248.246,16.120.148.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:34",
"message": "<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,176.218.248.246,16.120.148.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "176.218.248.246",
"serverIP": "16.120.148.67"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,176.218.248.246,16.120.148.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,176.218.248.246,16.120.148.67,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 176.218.248.246
serverIP: 16.120.148.67
|
Explain this syslog message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,112.88.71.181,126.107.227.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45324,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:34",
"message": "<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,112.88.71.181,126.107.227.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "112.88.71.181",
"serverIP": "126.107.227.63"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,112.88.71.181,126.107.227.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:34 DC1-PA3220-1 1,2023/12/21 16:37:34,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:34,112.88.71.181,126.107.227.63,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:34,0,1,45324,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:31,0,any,,7299323810766408671,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:34.653-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45324
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:34
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 112.88.71.181
serverIP: 126.107.227.63
|
Explain this syslog message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,82.115.12.114,43.8.88.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45340,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:13",
"message": "<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,82.115.12.114,43.8.88.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "82.115.12.114",
"serverIP": "43.8.88.125"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,82.115.12.114,43.8.88.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,82.115.12.114,43.8.88.125,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45340
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 82.115.12.114
serverIP: 43.8.88.125
|
Explain this syslog message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,203.107.175.84,245.140.172.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45340,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:37:13",
"message": "<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,203.107.175.84,245.140.172.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5432,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "203.107.175.84",
"serverIP": "245.140.172.119"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,203.107.175.84,245.140.172.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:37:13 DC1-PA3220-1 1,2023/12/21 16:37:13,016201032964,TRAFFIC,drop,2562,2023/12/21 16:37:13,203.107.175.84,245.140.172.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:37:13,0,1,45340,5432,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:37:10,0,any,,7299323810766406930,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:37:13.717-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45340
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:37:13
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5432
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 203.107.175.84
serverIP: 245.140.172.119
|
Explain this syslog message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,155.188.32.117,94.128.120.112,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33124,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:38:49",
"message": "<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,155.188.32.117,94.128.120.112,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "155.188.32.117",
"serverIP": "94.128.120.112"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,155.188.32.117,94.128.120.112,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,155.188.32.117,94.128.120.112,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33124
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:38:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 155.188.32.117
serverIP: 94.128.120.112
|
Explain this syslog message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,17.116.198.168,116.31.111.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33124,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:38:49",
"message": "<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,17.116.198.168,116.31.111.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 80,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "17.116.198.168",
"serverIP": "116.31.111.179"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,17.116.198.168,116.31.111.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:38:49 DC1-PA3220-1 1,2023/12/21 16:38:49,016201032964,TRAFFIC,drop,2562,2023/12/21 16:38:49,17.116.198.168,116.31.111.179,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:38:49,0,1,33124,80,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:38:46,0,any,,7299323810766415873,0x0,Netherlands,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:38:49.718-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33124
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:38:49
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 80
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 17.116.198.168
serverIP: 116.31.111.179
|
Explain this syslog message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,161.75.124.188,244.26.247.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44183,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:34:05",
"message": "<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,161.75.124.188,244.26.247.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 38910,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "161.75.124.188",
"serverIP": "244.26.247.137"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,161.75.124.188,244.26.247.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,161.75.124.188,244.26.247.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44183
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:34:05
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 38910
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 161.75.124.188
serverIP: 244.26.247.137
|
Explain this syslog message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,74.178.165.0,113.244.27.40,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 44183,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:34:05",
"message": "<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,74.178.165.0,113.244.27.40,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 38910,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "74.178.165.0",
"serverIP": "113.244.27.40"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,74.178.165.0,113.244.27.40,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:34:05 DC1-PA3220-1 1,2023/12/21 16:34:05,016201032964,TRAFFIC,drop,2562,2023/12/21 16:34:05,74.178.165.0,113.244.27.40,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:34:05,0,1,44183,38910,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:34:02,0,any,,7299323810766388933,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:34:05.555-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 44183
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:34:05
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 38910
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 74.178.165.0
serverIP: 113.244.27.40
|
Explain this syslog message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,0.93.18.160,249.124.198.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33788,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:32",
"message": "<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,0.93.18.160,249.124.198.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "0.93.18.160",
"serverIP": "249.124.198.212"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,0.93.18.160,249.124.198.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,0.93.18.160,249.124.198.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33788
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 0.93.18.160
serverIP: 249.124.198.212
|
Explain this syslog message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,244.184.155.125,204.15.43.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33788,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:31",
"message": "<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,244.184.155.125,204.15.43.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "244.184.155.125",
"serverIP": "204.15.43.107"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,244.184.155.125,204.15.43.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,244.184.155.125,204.15.43.107,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33788
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 244.184.155.125
serverIP: 204.15.43.107
|
Explain this syslog message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,233.211.0.69,233.165.53.223,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33788,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:32",
"message": "<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,233.211.0.69,233.165.53.223,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "233.211.0.69",
"serverIP": "233.165.53.223"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,233.211.0.69,233.165.53.223,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:32 DC1-PA3220-1 1,2023/12/21 16:35:32,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:32,233.211.0.69,233.165.53.223,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:32,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:28,0,any,,7299323810766396996,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:32.622-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33788
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:32
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 233.211.0.69
serverIP: 233.165.53.223
|
Explain this syslog message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,101.130.97.235,49.12.143.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 74,
"clientpackets": 1,
"clientport": 33788,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:31",
"message": "<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,101.130.97.235,49.12.143.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 74,
"streamName": "pan_firewall",
"clientIP": "101.130.97.235",
"serverIP": "49.12.143.106"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,101.130.97.235,49.12.143.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:31 DC1-PA3220-1 1,2023/12/21 16:35:31,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:31,101.130.97.235,49.12.143.106,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:31,0,1,33788,23,0,0,0x0,tcp,deny,74,74,0,1,2023/12/21 16:35:27,0,any,,7299323810766396914,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:31.651-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 74
clientpackets: 1
clientport: 33788
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 74
streamName: pan_firewall
clientIP: 101.130.97.235
serverIP: 49.12.143.106
|
Explain this syslog message
|
<14>Dec 21 16:35:19 DC1-PA3220-1 1,2023/12/21 16:35:19,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:19,31.243.121.46,59.79.200.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:19,0,1,52819,5065,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:35:16,0,any,,7299323810766395849,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:19.619-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 52819,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Dec 21 16:35:19",
"message": "<14>Dec 21 16:35:19 DC1-PA3220-1 1,2023/12/21 16:35:19,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:19,31.243.121.46,59.79.200.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:19,0,1,52819,5065,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:35:16,0,any,,7299323810766395849,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:19.619-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 5065,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "31.243.121.46",
"serverIP": "59.79.200.41"
}
|
Create a JSON artifact from the message
|
<14>Dec 21 16:35:19 DC1-PA3220-1 1,2023/12/21 16:35:19,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:19,31.243.121.46,59.79.200.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:19,0,1,52819,5065,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:35:16,0,any,,7299323810766395849,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:19.619-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Dec 21 16:35:19 DC1-PA3220-1 1,2023/12/21 16:35:19,016201032964,TRAFFIC,drop,2562,2023/12/21 16:35:19,31.243.121.46,59.79.200.41,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/12/21 16:35:19,0,1,52819,5065,0,0,0x0,tcp,deny,60,60,0,1,2023/12/21 16:35:16,0,any,,7299323810766395849,0x0,Germany,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-12-21T16:35:19.619-08:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 52819
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Dec 21 16:35:19
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 5065
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 31.243.121.46
serverIP: 59.79.200.41
|
Explain this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=201.134.28.144 dst=191.37.118.21 protocol=tcp sport=62818 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 62818,
"message": "<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=201.134.28.144 dst=191.37.118.21 protocol=tcp sport=62818 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "201.134.28.144",
"serverIP": "191.37.118.21"
}
|
Create a JSON artifact from the message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=201.134.28.144 dst=191.37.118.21 protocol=tcp sport=62818 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=201.134.28.144 dst=191.37.118.21 protocol=tcp sport=62818 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62818
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 201.134.28.144
serverIP: 191.37.118.21
|
Explain this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=0.188.1.112 dst=92.55.111.196 protocol=tcp sport=62818 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 62818,
"message": "<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=0.188.1.112 dst=92.55.111.196 protocol=tcp sport=62818 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "0.188.1.112",
"serverIP": "92.55.111.196"
}
|
Create a JSON artifact from the message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=0.188.1.112 dst=92.55.111.196 protocol=tcp sport=62818 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=0.188.1.112 dst=92.55.111.196 protocol=tcp sport=62818 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62818
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 0.188.1.112
serverIP: 92.55.111.196
|
Explain this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=200.153.155.183 dst=74.179.217.176 protocol=tcp sport=62818 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 62818,
"message": "<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=200.153.155.183 dst=74.179.217.176 protocol=tcp sport=62818 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "200.153.155.183",
"serverIP": "74.179.217.176"
}
|
Create a JSON artifact from the message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=200.153.155.183 dst=74.179.217.176 protocol=tcp sport=62818 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=200.153.155.183 dst=74.179.217.176 protocol=tcp sport=62818 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62818
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 200.153.155.183
serverIP: 74.179.217.176
|
Explain this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=214.191.202.11 dst=182.22.146.136 protocol=tcp sport=62818 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 62818,
"message": "<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=214.191.202.11 dst=182.22.146.136 protocol=tcp sport=62818 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "214.191.202.11",
"serverIP": "182.22.146.136"
}
|
Create a JSON artifact from the message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=214.191.202.11 dst=182.22.146.136 protocol=tcp sport=62818 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=156.19.155.186 1 1688225280.644236521 M47_MX67C_Opelika l7_firewall src=214.191.202.11 dst=182.22.146.136 protocol=tcp sport=62818 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62818
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 214.191.202.11
serverIP: 182.22.146.136
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=157.239.158.4 dst=240.227.84.107 protocol=tcp sport=53727 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53727,
"message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=157.239.158.4 dst=240.227.84.107 protocol=tcp sport=53727 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "157.239.158.4",
"serverIP": "240.227.84.107"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=157.239.158.4 dst=240.227.84.107 protocol=tcp sport=53727 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=157.239.158.4 dst=240.227.84.107 protocol=tcp sport=53727 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53727
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 157.239.158.4
serverIP: 240.227.84.107
|
Explain this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=149.209.200.70 dst=208.52.59.164 protocol=tcp sport=53727 dport=443 decision=blocked
|
{
"action": "block",
"clientport": 53727,
"message": "<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=149.209.200.70 dst=208.52.59.164 protocol=tcp sport=53727 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "149.209.200.70",
"serverIP": "208.52.59.164"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=149.209.200.70 dst=208.52.59.164 protocol=tcp sport=53727 dport=443 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.119.176.26 1 1688224390.980431960 M52_MX67C_Loxley l7_firewall src=149.209.200.70 dst=208.52.59.164 protocol=tcp sport=53727 dport=443 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53727
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 149.209.200.70
serverIP: 208.52.59.164
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.