input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<14>Sep 24 00:51:26 DC1-PA3220-1 1,2023/09/24 00:51:26,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:26,53.142.156.248,4.107.62.252,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:26,0,1,53040,39750,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:24,0,any,,7263933890210202691,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:26.877-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53040
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:51:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 39750
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 53.142.156.248
serverIP: 4.107.62.252
|
Explain this syslog message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,223.193.70.164,165.25.251.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45997,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:52:08",
"message": "<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,223.193.70.164,165.25.251.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "223.193.70.164",
"serverIP": "165.25.251.73"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,223.193.70.164,165.25.251.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,223.193.70.164,165.25.251.73,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45997
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:52:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 223.193.70.164
serverIP: 165.25.251.73
|
Explain this syslog message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,71.149.32.224,246.34.252.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 45997,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:52:08",
"message": "<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,71.149.32.224,246.34.252.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "71.149.32.224",
"serverIP": "246.34.252.137"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,71.149.32.224,246.34.252.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:52:08 DC1-PA3220-1 1,2023/09/24 00:52:08,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:08,71.149.32.224,246.34.252.137,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:08,0,1,45997,445,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:06,0,any,,7263933890210206319,0x0,Iran Islamic Republic Of,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:08.885-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 45997
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:52:08
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 445
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 71.149.32.224
serverIP: 246.34.252.137
|
Explain this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,101.253.61.63,108.226.225.201,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2280,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215376,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:53",
"message": "<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,101.253.61.63,108.226.225.201,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2280,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215376,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2280,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "101.253.61.63",
"serverIP": "108.226.225.201"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,101.253.61.63,108.226.225.201,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2280,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215376,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,101.253.61.63,108.226.225.201,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2280,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215376,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:53
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2280
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 101.253.61.63
serverIP: 108.226.225.201
|
Explain this syslog message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,121.216.53.235,201.175.24.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35449,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:51:31",
"message": "<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,121.216.53.235,201.175.24.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "121.216.53.235",
"serverIP": "201.175.24.62"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,121.216.53.235,201.175.24.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,121.216.53.235,201.175.24.62,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35449
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:51:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 121.216.53.235
serverIP: 201.175.24.62
|
Explain this syslog message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,90.71.147.26,64.238.3.226,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 35449,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:51:31",
"message": "<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,90.71.147.26,64.238.3.226,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8443,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "90.71.147.26",
"serverIP": "64.238.3.226"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,90.71.147.26,64.238.3.226,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:51:31 DC1-PA3220-1 1,2023/09/24 00:51:31,016201032964,TRAFFIC,drop,2562,2023/09/24 00:51:31,90.71.147.26,64.238.3.226,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:51:31,0,1,35449,8443,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:51:29,0,any,,7263933890210203140,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:51:31.878-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 35449
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:51:31
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8443
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 90.71.147.26
serverIP: 64.238.3.226
|
Explain this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,69.202.236.253,244.4.186.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:53",
"message": "<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,69.202.236.253,244.4.186.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2390,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "69.202.236.253",
"serverIP": "244.4.186.77"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,69.202.236.253,244.4.186.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,69.202.236.253,244.4.186.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:53
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2390
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 69.202.236.253
serverIP: 244.4.186.77
|
Explain this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,139.255.37.165,74.155.160.139,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:53",
"message": "<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,139.255.37.165,74.155.160.139,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2390,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "139.255.37.165",
"serverIP": "74.155.160.139"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,139.255.37.165,74.155.160.139,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,139.255.37.165,74.155.160.139,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:53
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2390
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 139.255.37.165
serverIP: 74.155.160.139
|
Explain this syslog message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,88.157.160.53,26.177.175.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64499,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:52:40",
"message": "<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,88.157.160.53,26.177.175.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "88.157.160.53",
"serverIP": "26.177.175.212"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,88.157.160.53,26.177.175.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,88.157.160.53,26.177.175.212,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64499
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:52:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 88.157.160.53
serverIP: 26.177.175.212
|
Explain this syslog message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,224.28.200.58,51.57.170.121,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 64499,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:52:40",
"message": "<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,224.28.200.58,51.57.170.121,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "224.28.200.58",
"serverIP": "51.57.170.121"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,224.28.200.58,51.57.170.121,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:52:40 DC1-PA3220-1 1,2023/09/24 00:52:39,016201032964,TRAFFIC,drop,2562,2023/09/24 00:52:39,224.28.200.58,51.57.170.121,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:52:39,0,1,64499,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:52:36,0,any,,7263933890210209047,0x0,China,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:52:40.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 64499
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:52:40
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 224.28.200.58
serverIP: 51.57.170.121
|
Explain this syslog message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,216.101.228.77,97.175.238.140,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:30",
"message": "<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,216.101.228.77,97.175.238.140,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3885,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "216.101.228.77",
"serverIP": "97.175.238.140"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,216.101.228.77,97.175.238.140,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,216.101.228.77,97.175.238.140,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3885
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 216.101.228.77
serverIP: 97.175.238.140
|
Explain this syslog message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,122.179.204.203,150.231.219.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:30",
"message": "<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,122.179.204.203,150.231.219.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3885,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "122.179.204.203",
"serverIP": "150.231.219.65"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,122.179.204.203,150.231.219.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:30 DC1-PA3220-1 1,2023/09/24 00:53:29,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:29,122.179.204.203,150.231.219.65,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:29,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:27,0,any,,7263933890210213383,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:30.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:30
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3885
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 122.179.204.203
serverIP: 150.231.219.65
|
Explain this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,170.77.160.124,193.153.47.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54356,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:52",
"message": "<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,170.77.160.124,193.153.47.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41221,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "193.153.47.102",
"serverIP": "170.77.160.124"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,170.77.160.124,193.153.47.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,170.77.160.124,193.153.47.102,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54356
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41221
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 193.153.47.102
serverIP: 170.77.160.124
|
Explain this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,162.230.245.245,89.253.113.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54356,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:52",
"message": "<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,162.230.245.245,89.253.113.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41221,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "89.253.113.15",
"serverIP": "162.230.245.245"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,162.230.245.245,89.253.113.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,162.230.245.245,89.253.113.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54356
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41221
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 89.253.113.15
serverIP: 162.230.245.245
|
Explain this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,190.7.71.189,216.230.150.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:53",
"message": "<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,190.7.71.189,216.230.150.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 2390,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "190.7.71.189",
"serverIP": "216.230.150.230"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,190.7.71.189,216.230.150.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:53 DC1-PA3220-1 1,2023/09/24 00:53:53,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:53,190.7.71.189,216.230.150.230,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:53,0,1,41228,2390,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:51,0,any,,7263933890210215377,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:53.856-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:53
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 2390
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 190.7.71.189
serverIP: 216.230.150.230
|
Explain this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,168.129.246.228,192.0.156.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,55210,61300,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:49,0,any,,7263933890210215302,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 61300,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:52",
"message": "<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,168.129.246.228,192.0.156.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,55210,61300,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:49,0,any,,7263933890210215302,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 55210,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "192.0.156.138",
"serverIP": "168.129.246.228"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,168.129.246.228,192.0.156.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,55210,61300,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:49,0,any,,7263933890210215302,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,168.129.246.228,192.0.156.138,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,55210,61300,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:49,0,any,,7263933890210215302,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 61300
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 55210
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 192.0.156.138
serverIP: 168.129.246.228
|
Explain this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,255.105.170.80,221.232.153.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 54356,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:52",
"message": "<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,255.105.170.80,221.232.153.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41221,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "221.232.153.241",
"serverIP": "255.105.170.80"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,255.105.170.80,221.232.153.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:52 DC1-PA3220-1 1,2023/09/24 00:53:52,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:52,255.105.170.80,221.232.153.241,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:52,0,1,41221,54356,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:50,0,any,,7263933890210215303,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:52.906-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 54356
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:52
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41221
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 221.232.153.241
serverIP: 255.105.170.80
|
Explain this syslog message
|
<14>Sep 24 00:53:51 DC1-PA3220-1 1,2023/09/24 00:53:50,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:50,164.104.5.7,135.141.34.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:50,0,1,41262,32661,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:48,0,any,,7263933890210215158,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:51.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41262,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:51",
"message": "<14>Sep 24 00:53:51 DC1-PA3220-1 1,2023/09/24 00:53:50,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:50,164.104.5.7,135.141.34.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:50,0,1,41262,32661,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:48,0,any,,7263933890210215158,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:51.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 32661,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "164.104.5.7",
"serverIP": "135.141.34.120"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:51 DC1-PA3220-1 1,2023/09/24 00:53:50,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:50,164.104.5.7,135.141.34.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:50,0,1,41262,32661,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:48,0,any,,7263933890210215158,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:51.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:51 DC1-PA3220-1 1,2023/09/24 00:53:50,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:50,164.104.5.7,135.141.34.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:50,0,1,41262,32661,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:48,0,any,,7263933890210215158,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:51.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41262
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:51
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 32661
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 164.104.5.7
serverIP: 135.141.34.120
|
Explain this syslog message
|
<14>Sep 24 00:53:12 DC1-PA3220-1 1,2023/09/24 00:53:11,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:11,64.116.231.85,207.179.251.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:11,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:09,0,any,,7263933890210211792,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:12.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:12",
"message": "<14>Sep 24 00:53:12 DC1-PA3220-1 1,2023/09/24 00:53:11,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:11,64.116.231.85,207.179.251.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:11,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:09,0,any,,7263933890210211792,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:12.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 3885,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "64.116.231.85",
"serverIP": "207.179.251.77"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:12 DC1-PA3220-1 1,2023/09/24 00:53:11,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:11,64.116.231.85,207.179.251.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:11,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:09,0,any,,7263933890210211792,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:12.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:12 DC1-PA3220-1 1,2023/09/24 00:53:11,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:11,64.116.231.85,207.179.251.77,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:11,0,1,41228,3885,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:09,0,any,,7263933890210211792,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:12.074-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:12
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 3885
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 64.116.231.85
serverIP: 207.179.251.77
|
Explain this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,211.127.217.79,155.118.132.199,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:10",
"message": "<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,211.127.217.79,155.118.132.199,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 64,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "211.127.217.79",
"serverIP": "155.118.132.199"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,211.127.217.79,155.118.132.199,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,211.127.217.79,155.118.132.199,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 64
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 211.127.217.79
serverIP: 155.118.132.199
|
Explain this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,162.230.111.73,168.112.188.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 41228,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:10",
"message": "<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,162.230.111.73,168.112.188.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 64,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "162.230.111.73",
"serverIP": "168.112.188.88"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,162.230.111.73,168.112.188.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,162.230.111.73,168.112.188.88,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41228,64,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211627,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 41228
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 64
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 162.230.111.73
serverIP: 168.112.188.88
|
Explain this syslog message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,176.15.92.106,84.168.242.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58939,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:54:06",
"message": "<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,176.15.92.106,84.168.242.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8728,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "176.15.92.106",
"serverIP": "84.168.242.15"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,176.15.92.106,84.168.242.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,176.15.92.106,84.168.242.15,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58939
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:54:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8728
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 176.15.92.106
serverIP: 84.168.242.15
|
Explain this syslog message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,196.182.37.143,213.6.235.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 58939,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:54:06",
"message": "<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,196.182.37.143,213.6.235.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 8728,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "196.182.37.143",
"serverIP": "213.6.235.198"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,196.182.37.143,213.6.235.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:54:06 DC1-PA3220-1 1,2023/09/24 00:54:05,016201032964,TRAFFIC,drop,2562,2023/09/24 00:54:05,196.182.37.143,213.6.235.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:54:05,0,1,58939,8728,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:54:03,0,any,,7263933890210216421,0x0,Bulgaria,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:54:06.077-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 58939
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:54:06
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 8728
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 196.182.37.143
serverIP: 213.6.235.198
|
Explain this syslog message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,52.154.156.125,166.70.234.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59360,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:26",
"message": "<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,52.154.156.125,166.70.234.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "52.154.156.125",
"serverIP": "166.70.234.99"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,52.154.156.125,166.70.234.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,52.154.156.125,166.70.234.99,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59360
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 52.154.156.125
serverIP: 166.70.234.99
|
Explain this syslog message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,43.248.205.227,235.240.181.155,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 59360,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:26",
"message": "<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,43.248.205.227,235.240.181.155,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 23,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "43.248.205.227",
"serverIP": "235.240.181.155"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,43.248.205.227,235.240.181.155,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:26 DC1-PA3220-1 1,2023/09/24 00:53:25,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:25,43.248.205.227,235.240.181.155,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:25,0,1,59360,23,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:23,0,any,,7263933890210212952,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:26.076-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 59360
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:26
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 23
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 43.248.205.227
serverIP: 235.240.181.155
|
Explain this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,120.186.215.232,10.113.59.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 60529,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:10",
"message": "<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,120.186.215.232,10.113.59.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41221,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "10.113.59.33",
"serverIP": "120.186.215.232"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,120.186.215.232,10.113.59.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,120.186.215.232,10.113.59.33,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 60529
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41221
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 10.113.59.33
serverIP: 120.186.215.232
|
Explain this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,89.158.30.136,135.159.252.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
{
"action": "block",
"application": "not-applicable",
"clientport": 60529,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Sep 24 00:53:10",
"message": "<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,89.158.30.136,135.159.252.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 41221,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "135.159.252.6",
"serverIP": "89.158.30.136"
}
|
Create a JSON artifact from the message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,89.158.30.136,135.159.252.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Sep 24 00:53:10 DC1-PA3220-1 1,2023/09/24 00:53:09,016201032964,TRAFFIC,drop,2562,2023/09/24 00:53:09,89.158.30.136,135.159.252.6,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/09/24 00:53:09,0,1,41221,60529,0,0,0x0,tcp,deny,60,60,0,1,2023/09/24 00:53:06,0,any,,7263933890210211628,0x0,Russian Federation,United States,,1,0,policy-deny,265,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,e7553640-425c-4dda-8f02-57d4a3791c1c,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-09-24T00:53:10.093-07:00,,,unknown,unknown,unknown,1,,,not-applicable,no,no,0
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 60529
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Sep 24 00:53:10
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 41221
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 135.159.252.6
serverIP: 89.158.30.136
|
Explain this syslog message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,98.143.86.133,161.150.15.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 60023,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:45:02",
"message": "<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,98.143.86.133,161.150.15.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 24063,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "161.150.15.143",
"serverIP": "98.143.86.133"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,98.143.86.133,161.150.15.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,98.143.86.133,161.150.15.143,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 60023
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:45:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 24063
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 161.150.15.143
serverIP: 98.143.86.133
|
Explain this syslog message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,128.27.5.208,160.40.231.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientport": 60023,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:45:02",
"message": "<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,128.27.5.208,160.40.231.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverbytes": 60,
"serverpackets": 1,
"serverport": 24063,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "160.40.231.168",
"serverIP": "128.27.5.208"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,128.27.5.208,160.40.231.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:45:02 DC1-PA3220-1 1,2023/06/30 10:45:02,016201032964,TRAFFIC,drop,2560,2023/06/30 10:45:02,128.27.5.208,160.40.231.168,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:45:02,0,1,24063,60023,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:45:02,0,any,0,5852232654,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:45:02.984-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientport: 60023
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:45:02
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverbytes: 60
serverpackets: 1
serverport: 24063
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 160.40.231.168
serverIP: 128.27.5.208
|
Explain this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,215.211.22.45,219.25.165.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53302,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:46:36",
"message": "<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,215.211.22.45,219.25.165.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 50318,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "215.211.22.45",
"serverIP": "219.25.165.198"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,215.211.22.45,219.25.165.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,215.211.22.45,219.25.165.198,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53302
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:46:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 50318
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 215.211.22.45
serverIP: 219.25.165.198
|
Explain this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,210.180.25.121,173.189.107.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53302,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:46:36",
"message": "<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,210.180.25.121,173.189.107.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 50318,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "210.180.25.121",
"serverIP": "173.189.107.148"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,210.180.25.121,173.189.107.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,210.180.25.121,173.189.107.148,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53302
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:46:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 50318
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 210.180.25.121
serverIP: 173.189.107.148
|
Explain this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,87.58.249.37,74.40.205.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53302,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:46:36",
"message": "<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,87.58.249.37,74.40.205.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 50318,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "87.58.249.37",
"serverIP": "74.40.205.101"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,87.58.249.37,74.40.205.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,87.58.249.37,74.40.205.101,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53302
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:46:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 50318
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 87.58.249.37
serverIP: 74.40.205.101
|
Explain this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,248.90.176.77,151.21.0.135,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53302,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:46:36",
"message": "<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,248.90.176.77,151.21.0.135,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 50318,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "248.90.176.77",
"serverIP": "151.21.0.135"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,248.90.176.77,151.21.0.135,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:46:36 DC1-PA3220-1 1,2023/06/30 10:46:35,016201032964,TRAFFIC,drop,2560,2023/06/30 10:46:35,248.90.176.77,151.21.0.135,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:46:35,0,1,53302,50318,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:46:36,0,any,0,5852244186,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:46:36.003-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53302
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:46:36
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 50318
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 248.90.176.77
serverIP: 151.21.0.135
|
Explain this syslog message
|
<14>Jun 30 10:47:43 DC1-PA3220-1 1,2023/06/30 10:47:42,016201032964,TRAFFIC,drop,2560,2023/06/30 10:47:42,184.50.183.206,44.39.25.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:47:42,0,1,53302,52661,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:47:42,0,any,0,5852267205,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:47:43.016-07:00,,
|
{
"action": "block",
"application": "not-applicable",
"clientbytes": 60,
"clientpackets": 1,
"clientport": 53302,
"facilitycode": 1,
"facilitylabel": "user-level",
"localhostname": "DC1-PA3220-1",
"localstarttime": "Jun 30 10:47:43",
"message": "<14>Jun 30 10:47:43 DC1-PA3220-1 1,2023/06/30 10:47:42,016201032964,TRAFFIC,drop,2560,2023/06/30 10:47:42,184.50.183.206,44.39.25.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:47:42,0,1,53302,52661,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:47:42,0,any,0,5852267205,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:47:43.016-07:00,,",
"messagetype": "traffic_drop",
"priority": 14,
"protocol": 6,
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"sensitivity": "normal",
"serverport": 52661,
"severitycode": 6,
"severitylabel": "informational",
"sourceinfo": "unknown",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"totalbytes": 60,
"streamName": "pan_firewall",
"clientIP": "184.50.183.206",
"serverIP": "44.39.25.220"
}
|
Create a JSON artifact from the message
|
<14>Jun 30 10:47:43 DC1-PA3220-1 1,2023/06/30 10:47:42,016201032964,TRAFFIC,drop,2560,2023/06/30 10:47:42,184.50.183.206,44.39.25.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:47:42,0,1,53302,52661,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:47:42,0,any,0,5852267205,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:47:43.016-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Jun 30 10:47:43 DC1-PA3220-1 1,2023/06/30 10:47:42,016201032964,TRAFFIC,drop,2560,2023/06/30 10:47:42,184.50.183.206,44.39.25.220,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/06/30 10:47:42,0,1,53302,52661,0,0,0x0,tcp,deny,60,60,0,1,2023/06/30 10:47:42,0,any,0,5852267205,0x0,Netherlands,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-06-30T10:47:43.016-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
action: block
application: not-applicable
clientbytes: 60
clientpackets: 1
clientport: 53302
facilitycode: 1
facilitylabel: user-level
localhostname: DC1-PA3220-1
localstarttime: Jun 30 10:47:43
messagetype: traffic_drop
priority: 14
protocol: 6
rulename: Geo Block Inbound
senderhost: 10.99.10.30
sensitivity: normal
serverport: 52661
severitycode: 6
severitylabel: informational
sourceinfo: unknown
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
totalbytes: 60
streamName: pan_firewall
clientIP: 184.50.183.206
serverIP: 44.39.25.220
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.