input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35409,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46314,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "137.255.70.173",
"serverIP": "235.118.73.86"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35409
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46314
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 137.255.70.173
serverIP: 235.118.73.86 | Explain this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35409,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46314,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "199.250.111.213",
"serverIP": "126.11.22.213"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35409
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46314
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 199.250.111.213
serverIP: 126.11.22.213 | Explain this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 34955,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "220.233.54.222",
"serverIP": "52.56.107.204"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 34955
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 220.233.54.222
serverIP: 52.56.107.204 | Explain this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 34955,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.158.84.214",
"serverIP": "152.170.11.155"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 34955
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 35.158.84.214
serverIP: 152.170.11.155 | Explain this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12588,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 30116,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "46.198.164.71",
"serverIP": "83.112.128.69"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12588
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 30116
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 46.198.164.71
serverIP: 83.112.128.69 | Explain this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12588,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 30116,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "131.167.98.11",
"serverIP": "118.79.254.213"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12588
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 30116
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 131.167.98.11
serverIP: 118.79.254.213 | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51430,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "122.185.205.113",
"serverIP": "177.99.172.240"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51430
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 122.185.205.113
serverIP: 177.99.172.240 | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51430,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "137.40.56.43",
"serverIP": "42.246.49.106"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51430
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 137.40.56.43
serverIP: 42.246.49.106 | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:13",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 58914,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "184.78.36.127",
"serverIP": "236.164.66.108"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:13
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 58914
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 184.78.36.127
serverIP: 236.164.66.108 | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:13",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 58914,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "255.116.254.91",
"serverIP": "18.213.90.172"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:13
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 58914
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 255.116.254.91
serverIP: 18.213.90.172 | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:13",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 58914,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "232.214.11.167",
"serverIP": "202.242.142.116"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:13
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 58914
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 232.214.11.167
serverIP: 202.242.142.116 | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:13",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 58914,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "106.202.246.73",
"serverIP": "38.233.168.170"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:10,0,any,0,4493181469,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:13.433-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:13
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 58914
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 106.202.246.73
serverIP: 38.233.168.170 | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:34",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 50216,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "45.9.79.132",
"serverIP": "85.227.79.24"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:34
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 50216
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 45.9.79.132
serverIP: 85.227.79.24 | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:34",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 50216,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "109.29.50.21",
"serverIP": "49.1.106.193"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:34
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 50216
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 109.29.50.21
serverIP: 49.1.106.193 | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:34",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 50216,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "143.118.81.178",
"serverIP": "59.248.229.93"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:34
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 50216
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 143.118.81.178
serverIP: 59.248.229.93 | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,,",
"action": "block",
"localstarttime": "Feb 24 16:18:34",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 50216,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "130.27.235.63",
"serverIP": "11.19.83.85"
} | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:31,0,any,0,4493183848,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-02-24T16:18:34.437-08:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Feb 24 16:18:34
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 50216
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 130.27.235.63
serverIP: 11.19.83.85 | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43061,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.171.192.129",
"serverIP": "237.63.57.232"
} | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43061
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.171.192.129
serverIP: 237.63.57.232 | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43061,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "173.249.34.189",
"serverIP": "171.142.250.104"
} | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43061
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 173.249.34.189
serverIP: 171.142.250.104 | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43061,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "164.61.31.167",
"serverIP": "172.173.68.74"
} | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43061
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 164.61.31.167
serverIP: 172.173.68.74 | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43061,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "143.222.79.52",
"serverIP": "226.137.118.101"
} | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43061
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 143.222.79.52
serverIP: 226.137.118.101 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5572,
"protocol": 6,
"streamName": "meraki",
"clientIP": "31.120.20.13",
"serverIP": "159.175.231.116"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamName: meraki
clientIP: 31.120.20.13
serverIP: 159.175.231.116 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5572,
"protocol": 6,
"streamName": "meraki",
"clientIP": "150.42.157.236",
"serverIP": "190.142.89.97"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamName: meraki
clientIP: 150.42.157.236
serverIP: 190.142.89.97 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6197,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.63.77.172",
"serverIP": "72.104.26.151"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamName: meraki
clientIP: 54.63.77.172
serverIP: 72.104.26.151 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6197,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.121.13.13",
"serverIP": "181.64.29.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamName: meraki
clientIP: 15.121.13.13
serverIP: 181.64.29.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49696,
"protocol": 6,
"streamName": "meraki",
"clientIP": "144.15.229.223",
"serverIP": "93.182.159.239"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49696
protocol: 6
streamName: meraki
clientIP: 144.15.229.223
serverIP: 93.182.159.239 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49696,
"protocol": 6,
"streamName": "meraki",
"clientIP": "29.35.56.102",
"serverIP": "171.56.67.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49696
protocol: 6
streamName: meraki
clientIP: 29.35.56.102
serverIP: 171.56.67.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10392,
"protocol": 6,
"streamName": "meraki",
"clientIP": "92.108.225.20",
"serverIP": "112.160.39.244"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10392
protocol: 6
streamName: meraki
clientIP: 92.108.225.20
serverIP: 112.160.39.244 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10392,
"protocol": 6,
"streamName": "meraki",
"clientIP": "160.219.214.178",
"serverIP": "13.83.77.168"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10392
protocol: 6
streamName: meraki
clientIP: 160.219.214.178
serverIP: 13.83.77.168 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "186.35.146.38",
"serverIP": "58.248.199.164"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24065
protocol: 6
streamName: meraki
clientIP: 186.35.146.38
serverIP: 58.248.199.164 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "249.111.119.155",
"serverIP": "54.225.27.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24065
protocol: 6
streamName: meraki
clientIP: 249.111.119.155
serverIP: 54.225.27.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "104.251.99.107",
"serverIP": "9.48.20.244"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33504
protocol: 6
streamName: meraki
clientIP: 104.251.99.107
serverIP: 9.48.20.244 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "126.124.0.128",
"serverIP": "84.50.93.219"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33504
protocol: 6
streamName: meraki
clientIP: 126.124.0.128
serverIP: 84.50.93.219 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 1889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "104.229.125.221",
"serverIP": "91.62.247.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1889
protocol: 6
streamName: meraki
clientIP: 104.229.125.221
serverIP: 91.62.247.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 1889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "153.185.44.105",
"serverIP": "244.185.55.125"
} | Create a JSON artifact from the message |