input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=3.105.161.251 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=185.199.89.51 dst=3.105.161.251 protocol=tcp sport=29817 dport=2086 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2086
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29817
protocol: 6
streamName: meraki
clientIP: 185.199.89.51
serverIP: 3.105.161.251 | Explain this syslog message |
<134>Original Address=19.215.114.94 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=93.164.218.30 dst=19.215.114.94 protocol=tcp sport=29817 dport=2086 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2086,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=19.215.114.94 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=93.164.218.30 dst=19.215.114.94 protocol=tcp sport=29817 dport=2086 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29817,
"protocol": 6,
"streamName": "meraki",
"clientIP": "93.164.218.30",
"serverIP": "19.215.114.94"
} | Create a JSON artifact from the message |
<134>Original Address=19.215.114.94 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=93.164.218.30 dst=19.215.114.94 protocol=tcp sport=29817 dport=2086 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=19.215.114.94 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=93.164.218.30 dst=19.215.114.94 protocol=tcp sport=29817 dport=2086 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2086
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29817
protocol: 6
streamName: meraki
clientIP: 93.164.218.30
serverIP: 19.215.114.94 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=229.56.132.31 dst=162.198.32.90 protocol=tcp sport=35252 dport=25 pattern: 1 dst 162.198.32.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=229.56.132.31 dst=162.198.32.90 protocol=tcp sport=35252 dport=25 pattern: 1 dst 162.198.32.90",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35252,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.56.132.31",
"serverIP": "162.198.32.90"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=229.56.132.31 dst=162.198.32.90 protocol=tcp sport=35252 dport=25 pattern: 1 dst 162.198.32.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=229.56.132.31 dst=162.198.32.90 protocol=tcp sport=35252 dport=25 pattern: 1 dst 162.198.32.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35252
protocol: 6
streamName: meraki
clientIP: 229.56.132.31
serverIP: 162.198.32.90 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=134.120.216.45 dst=140.127.0.246 protocol=tcp sport=35252 dport=25 pattern: 1 dst 140.127.0.246 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=134.120.216.45 dst=140.127.0.246 protocol=tcp sport=35252 dport=25 pattern: 1 dst 140.127.0.246",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35252,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.120.216.45",
"serverIP": "140.127.0.246"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=134.120.216.45 dst=140.127.0.246 protocol=tcp sport=35252 dport=25 pattern: 1 dst 140.127.0.246 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=134.120.216.45 dst=140.127.0.246 protocol=tcp sport=35252 dport=25 pattern: 1 dst 140.127.0.246 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35252
protocol: 6
streamName: meraki
clientIP: 134.120.216.45
serverIP: 140.127.0.246 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=229.6.75.0 dst=106.217.60.199 protocol=tcp sport=33944 dport=25 pattern: 1 dst 106.217.60.199 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=229.6.75.0 dst=106.217.60.199 protocol=tcp sport=33944 dport=25 pattern: 1 dst 106.217.60.199",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33944,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.6.75.0",
"serverIP": "106.217.60.199"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=229.6.75.0 dst=106.217.60.199 protocol=tcp sport=33944 dport=25 pattern: 1 dst 106.217.60.199 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=229.6.75.0 dst=106.217.60.199 protocol=tcp sport=33944 dport=25 pattern: 1 dst 106.217.60.199 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33944
protocol: 6
streamName: meraki
clientIP: 229.6.75.0
serverIP: 106.217.60.199 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=23.136.200.37 dst=210.79.177.159 protocol=tcp sport=33944 dport=25 pattern: 1 dst 210.79.177.159 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=23.136.200.37 dst=210.79.177.159 protocol=tcp sport=33944 dport=25 pattern: 1 dst 210.79.177.159",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33944,
"protocol": 6,
"streamName": "meraki",
"clientIP": "23.136.200.37",
"serverIP": "210.79.177.159"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=23.136.200.37 dst=210.79.177.159 protocol=tcp sport=33944 dport=25 pattern: 1 dst 210.79.177.159 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.648826161 NORDC_MX400_1 flows src=23.136.200.37 dst=210.79.177.159 protocol=tcp sport=33944 dport=25 pattern: 1 dst 210.79.177.159 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33944
protocol: 6
streamName: meraki
clientIP: 23.136.200.37
serverIP: 210.79.177.159 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=45.113.212.34 dst=250.123.229.55 protocol=tcp sport=25307 dport=25 pattern: 1 dst 250.123.229.55 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=45.113.212.34 dst=250.123.229.55 protocol=tcp sport=25307 dport=25 pattern: 1 dst 250.123.229.55",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 25307,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.113.212.34",
"serverIP": "250.123.229.55"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=45.113.212.34 dst=250.123.229.55 protocol=tcp sport=25307 dport=25 pattern: 1 dst 250.123.229.55 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=45.113.212.34 dst=250.123.229.55 protocol=tcp sport=25307 dport=25 pattern: 1 dst 250.123.229.55 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 25307
protocol: 6
streamName: meraki
clientIP: 45.113.212.34
serverIP: 250.123.229.55 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=221.57.144.20 dst=68.137.97.21 protocol=tcp sport=25307 dport=25 pattern: 1 dst 68.137.97.21 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=221.57.144.20 dst=68.137.97.21 protocol=tcp sport=25307 dport=25 pattern: 1 dst 68.137.97.21",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 25307,
"protocol": 6,
"streamName": "meraki",
"clientIP": "221.57.144.20",
"serverIP": "68.137.97.21"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=221.57.144.20 dst=68.137.97.21 protocol=tcp sport=25307 dport=25 pattern: 1 dst 68.137.97.21 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.652942792 NORDC_MX400_1 flows src=221.57.144.20 dst=68.137.97.21 protocol=tcp sport=25307 dport=25 pattern: 1 dst 68.137.97.21 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 25307
protocol: 6
streamName: meraki
clientIP: 221.57.144.20
serverIP: 68.137.97.21 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=15.219.192.154 dst=202.173.135.6 protocol=tcp sport=6356 dport=25 pattern: 1 dst 202.173.135.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=15.219.192.154 dst=202.173.135.6 protocol=tcp sport=6356 dport=25 pattern: 1 dst 202.173.135.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6356,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.219.192.154",
"serverIP": "202.173.135.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=15.219.192.154 dst=202.173.135.6 protocol=tcp sport=6356 dport=25 pattern: 1 dst 202.173.135.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=15.219.192.154 dst=202.173.135.6 protocol=tcp sport=6356 dport=25 pattern: 1 dst 202.173.135.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6356
protocol: 6
streamName: meraki
clientIP: 15.219.192.154
serverIP: 202.173.135.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=39.161.68.163 dst=174.36.99.118 protocol=tcp sport=6356 dport=25 pattern: 1 dst 174.36.99.118 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=39.161.68.163 dst=174.36.99.118 protocol=tcp sport=6356 dport=25 pattern: 1 dst 174.36.99.118",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6356,
"protocol": 6,
"streamName": "meraki",
"clientIP": "39.161.68.163",
"serverIP": "174.36.99.118"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=39.161.68.163 dst=174.36.99.118 protocol=tcp sport=6356 dport=25 pattern: 1 dst 174.36.99.118 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.736547572 NORDC_MX400_1 flows src=39.161.68.163 dst=174.36.99.118 protocol=tcp sport=6356 dport=25 pattern: 1 dst 174.36.99.118 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6356
protocol: 6
streamName: meraki
clientIP: 39.161.68.163
serverIP: 174.36.99.118 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=131.153.215.158 dst=7.62.179.252 protocol=tcp sport=35252 dport=25 pattern: 1 dst 7.62.179.252 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=131.153.215.158 dst=7.62.179.252 protocol=tcp sport=35252 dport=25 pattern: 1 dst 7.62.179.252",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35252,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.153.215.158",
"serverIP": "7.62.179.252"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=131.153.215.158 dst=7.62.179.252 protocol=tcp sport=35252 dport=25 pattern: 1 dst 7.62.179.252 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=131.153.215.158 dst=7.62.179.252 protocol=tcp sport=35252 dport=25 pattern: 1 dst 7.62.179.252 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35252
protocol: 6
streamName: meraki
clientIP: 131.153.215.158
serverIP: 7.62.179.252 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=156.141.225.158 dst=87.208.218.56 protocol=tcp sport=35252 dport=25 pattern: 1 dst 87.208.218.56 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=156.141.225.158 dst=87.208.218.56 protocol=tcp sport=35252 dport=25 pattern: 1 dst 87.208.218.56",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35252,
"protocol": 6,
"streamName": "meraki",
"clientIP": "156.141.225.158",
"serverIP": "87.208.218.56"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=156.141.225.158 dst=87.208.218.56 protocol=tcp sport=35252 dport=25 pattern: 1 dst 87.208.218.56 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835767.749998553 NORDC_MX400_1 flows src=156.141.225.158 dst=87.208.218.56 protocol=tcp sport=35252 dport=25 pattern: 1 dst 87.208.218.56 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35252
protocol: 6
streamName: meraki
clientIP: 156.141.225.158
serverIP: 87.208.218.56 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=233.78.39.131 dst=48.94.81.172 protocol=tcp sport=21217 dport=25 pattern: 1 dst 48.94.81.172 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=233.78.39.131 dst=48.94.81.172 protocol=tcp sport=21217 dport=25 pattern: 1 dst 48.94.81.172",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 21217,
"protocol": 6,
"streamName": "meraki",
"clientIP": "233.78.39.131",
"serverIP": "48.94.81.172"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=233.78.39.131 dst=48.94.81.172 protocol=tcp sport=21217 dport=25 pattern: 1 dst 48.94.81.172 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=233.78.39.131 dst=48.94.81.172 protocol=tcp sport=21217 dport=25 pattern: 1 dst 48.94.81.172 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 21217
protocol: 6
streamName: meraki
clientIP: 233.78.39.131
serverIP: 48.94.81.172 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=112.20.145.164 dst=215.25.91.137 protocol=tcp sport=21217 dport=25 pattern: 1 dst 215.25.91.137 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=112.20.145.164 dst=215.25.91.137 protocol=tcp sport=21217 dport=25 pattern: 1 dst 215.25.91.137",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 21217,
"protocol": 6,
"streamName": "meraki",
"clientIP": "112.20.145.164",
"serverIP": "215.25.91.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=112.20.145.164 dst=215.25.91.137 protocol=tcp sport=21217 dport=25 pattern: 1 dst 215.25.91.137 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.757313486 NORDC_MX400_1 flows src=112.20.145.164 dst=215.25.91.137 protocol=tcp sport=21217 dport=25 pattern: 1 dst 215.25.91.137 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 21217
protocol: 6
streamName: meraki
clientIP: 112.20.145.164
serverIP: 215.25.91.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=58.214.153.244 dst=39.63.255.33 protocol=tcp sport=39777 dport=25 pattern: 1 dst 39.63.255.33 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=58.214.153.244 dst=39.63.255.33 protocol=tcp sport=39777 dport=25 pattern: 1 dst 39.63.255.33",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 39777,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.214.153.244",
"serverIP": "39.63.255.33"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=58.214.153.244 dst=39.63.255.33 protocol=tcp sport=39777 dport=25 pattern: 1 dst 39.63.255.33 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=58.214.153.244 dst=39.63.255.33 protocol=tcp sport=39777 dport=25 pattern: 1 dst 39.63.255.33 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 39777
protocol: 6
streamName: meraki
clientIP: 58.214.153.244
serverIP: 39.63.255.33 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=123.226.33.189 dst=8.171.154.75 protocol=tcp sport=39777 dport=25 pattern: 1 dst 8.171.154.75 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=123.226.33.189 dst=8.171.154.75 protocol=tcp sport=39777 dport=25 pattern: 1 dst 8.171.154.75",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 39777,
"protocol": 6,
"streamName": "meraki",
"clientIP": "123.226.33.189",
"serverIP": "8.171.154.75"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=123.226.33.189 dst=8.171.154.75 protocol=tcp sport=39777 dport=25 pattern: 1 dst 8.171.154.75 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658835768.761986564 NORDC_MX400_1 flows src=123.226.33.189 dst=8.171.154.75 protocol=tcp sport=39777 dport=25 pattern: 1 dst 8.171.154.75 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 39777
protocol: 6
streamName: meraki
clientIP: 123.226.33.189
serverIP: 8.171.154.75 | Explain this syslog message |
<134>Original Address=176.151.2.235 1 1670934374.382723554 M52_MX67C_Loxley flows src=242.158.66.77 dst=176.151.2.235 protocol=tcp sport=58273 dport=41236 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 41236,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=176.151.2.235 1 1670934374.382723554 M52_MX67C_Loxley flows src=242.158.66.77 dst=176.151.2.235 protocol=tcp sport=58273 dport=41236 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58273,
"protocol": 6,
"streamName": "meraki",
"clientIP": "242.158.66.77",
"serverIP": "176.151.2.235"
} | Create a JSON artifact from the message |
<134>Original Address=176.151.2.235 1 1670934374.382723554 M52_MX67C_Loxley flows src=242.158.66.77 dst=176.151.2.235 protocol=tcp sport=58273 dport=41236 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=176.151.2.235 1 1670934374.382723554 M52_MX67C_Loxley flows src=242.158.66.77 dst=176.151.2.235 protocol=tcp sport=58273 dport=41236 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 41236
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58273
protocol: 6
streamName: meraki
clientIP: 242.158.66.77
serverIP: 176.151.2.235 | Explain this syslog message |
<134>Original Address=131.107.4.167 1 1670934374.382723554 M52_MX67C_Loxley flows src=15.15.11.80 dst=131.107.4.167 protocol=tcp sport=58273 dport=41236 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 41236,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=131.107.4.167 1 1670934374.382723554 M52_MX67C_Loxley flows src=15.15.11.80 dst=131.107.4.167 protocol=tcp sport=58273 dport=41236 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58273,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.15.11.80",
"serverIP": "131.107.4.167"
} | Create a JSON artifact from the message |
<134>Original Address=131.107.4.167 1 1670934374.382723554 M52_MX67C_Loxley flows src=15.15.11.80 dst=131.107.4.167 protocol=tcp sport=58273 dport=41236 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=131.107.4.167 1 1670934374.382723554 M52_MX67C_Loxley flows src=15.15.11.80 dst=131.107.4.167 protocol=tcp sport=58273 dport=41236 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 41236
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58273
protocol: 6
streamName: meraki
clientIP: 15.15.11.80
serverIP: 131.107.4.167 | Explain this syslog message |
<134>Original Address=194.181.166.98 1 1670934374.382723554 M52_MX67C_Loxley flows src=56.187.111.22 dst=194.181.166.98 protocol=tcp sport=58273 dport=41236 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 41236,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=194.181.166.98 1 1670934374.382723554 M52_MX67C_Loxley flows src=56.187.111.22 dst=194.181.166.98 protocol=tcp sport=58273 dport=41236 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58273,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.187.111.22",
"serverIP": "194.181.166.98"
} | Create a JSON artifact from the message |
<134>Original Address=194.181.166.98 1 1670934374.382723554 M52_MX67C_Loxley flows src=56.187.111.22 dst=194.181.166.98 protocol=tcp sport=58273 dport=41236 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=194.181.166.98 1 1670934374.382723554 M52_MX67C_Loxley flows src=56.187.111.22 dst=194.181.166.98 protocol=tcp sport=58273 dport=41236 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 41236
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58273
protocol: 6
streamName: meraki
clientIP: 56.187.111.22
serverIP: 194.181.166.98 | Explain this syslog message |
<134>Original Address=12.175.87.107 1 1670934374.382723554 M52_MX67C_Loxley flows src=11.20.24.239 dst=12.175.87.107 protocol=tcp sport=58273 dport=41236 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 41236,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.175.87.107 1 1670934374.382723554 M52_MX67C_Loxley flows src=11.20.24.239 dst=12.175.87.107 protocol=tcp sport=58273 dport=41236 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58273,
"protocol": 6,
"streamName": "meraki",
"clientIP": "11.20.24.239",
"serverIP": "12.175.87.107"
} | Create a JSON artifact from the message |
<134>Original Address=12.175.87.107 1 1670934374.382723554 M52_MX67C_Loxley flows src=11.20.24.239 dst=12.175.87.107 protocol=tcp sport=58273 dport=41236 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.175.87.107 1 1670934374.382723554 M52_MX67C_Loxley flows src=11.20.24.239 dst=12.175.87.107 protocol=tcp sport=58273 dport=41236 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 41236
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58273
protocol: 6
streamName: meraki
clientIP: 11.20.24.239
serverIP: 12.175.87.107 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:166.147.75.218/15871 dst dmz-1:101.130.35.141/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:166.147.75.218/15871 dst dmz-1:101.130.35.141/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15871,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "166.147.75.218",
"serverIP": "101.130.35.141"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:166.147.75.218/15871 dst dmz-1:101.130.35.141/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:166.147.75.218/15871 dst dmz-1:101.130.35.141/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15871
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 166.147.75.218
serverIP: 101.130.35.141 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:28.66.128.76/15871 dst dmz-1:180.77.94.19/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:28.66.128.76/15871 dst dmz-1:180.77.94.19/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15871,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "28.66.128.76",
"serverIP": "180.77.94.19"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:28.66.128.76/15871 dst dmz-1:180.77.94.19/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:28.66.128.76/15871 dst dmz-1:180.77.94.19/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15871
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 28.66.128.76
serverIP: 180.77.94.19 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:135.17.120.18/47819 dst dmz-1:237.226.186.199/20092 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 20092,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:135.17.120.18/47819 dst dmz-1:237.226.186.199/20092 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47819,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "135.17.120.18",
"serverIP": "237.226.186.199"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:135.17.120.18/47819 dst dmz-1:237.226.186.199/20092 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:135.17.120.18/47819 dst dmz-1:237.226.186.199/20092 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 20092
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47819
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 135.17.120.18
serverIP: 237.226.186.199 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:201.249.146.49/47819 dst dmz-1:49.181.67.139/20092 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 20092,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:201.249.146.49/47819 dst dmz-1:49.181.67.139/20092 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47819,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "201.249.146.49",
"serverIP": "49.181.67.139"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:201.249.146.49/47819 dst dmz-1:49.181.67.139/20092 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:201.249.146.49/47819 dst dmz-1:49.181.67.139/20092 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 20092
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47819
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 201.249.146.49
serverIP: 49.181.67.139 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:231.148.185.233/15871 dst dmz-1:219.237.22.0/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:231.148.185.233/15871 dst dmz-1:219.237.22.0/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15871,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "231.148.185.233",
"serverIP": "219.237.22.0"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:231.148.185.233/15871 dst dmz-1:219.237.22.0/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:231.148.185.233/15871 dst dmz-1:219.237.22.0/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15871
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 231.148.185.233
serverIP: 219.237.22.0 | Explain this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:213.63.48.0/15871 dst dmz-1:241.150.108.2/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:213.63.48.0/15871 dst dmz-1:241.150.108.2/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15871,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "213.63.48.0",
"serverIP": "241.150.108.2"
} | Create a JSON artifact from the message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:213.63.48.0/15871 dst dmz-1:241.150.108.2/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 02 2023 03:39:07: %ASA-4-106023: Deny tcp src outside:213.63.48.0/15871 dst dmz-1:241.150.108.2/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15871
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 213.63.48.0
serverIP: 241.150.108.2 | Explain this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,75.98.214.72,58.191.154.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,75.98.214.72,58.191.154.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:16:09",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "75.98.214.72",
"serverIP": "58.191.154.36"
} | Create a JSON artifact from the message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,75.98.214.72,58.191.154.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,75.98.214.72,58.191.154.36,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:16:09
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 75.98.214.72
serverIP: 58.191.154.36 | Explain this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,65.61.239.122,74.160.219.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,65.61.239.122,74.160.219.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:16:09",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "65.61.239.122",
"serverIP": "74.160.219.149"
} | Create a JSON artifact from the message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,65.61.239.122,74.160.219.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,65.61.239.122,74.160.219.149,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:16:09
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 65.61.239.122
serverIP: 74.160.219.149 | Explain this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,121.7.86.114,71.157.218.89,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,121.7.86.114,71.157.218.89,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:16:09",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "121.7.86.114",
"serverIP": "71.157.218.89"
} | Create a JSON artifact from the message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,121.7.86.114,71.157.218.89,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,121.7.86.114,71.157.218.89,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:16:09
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 121.7.86.114
serverIP: 71.157.218.89 | Explain this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,232.111.220.201,92.22.215.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,232.111.220.201,92.22.215.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:16:09",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "232.111.220.201",
"serverIP": "92.22.215.7"
} | Create a JSON artifact from the message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,232.111.220.201,92.22.215.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:16:09 DC1-PA3220-1 1,2023/03/31 02:16:08,016201032964,TRAFFIC,drop,2560,2023/03/31 02:16:08,232.111.220.201,92.22.215.7,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:16:08,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:16:09,0,any,0,4848418460,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:16:09.288-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:16:09
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 232.111.220.201
serverIP: 92.22.215.7 | Explain this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,33.219.122.47,101.139.44.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,33.219.122.47,101.139.44.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "33.219.122.47",
"serverIP": "101.139.44.164"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,33.219.122.47,101.139.44.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,33.219.122.47,101.139.44.164,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 33.219.122.47
serverIP: 101.139.44.164 | Explain this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,140.248.156.145,2.32.229.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,140.248.156.145,2.32.229.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "140.248.156.145",
"serverIP": "2.32.229.108"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,140.248.156.145,2.32.229.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,140.248.156.145,2.32.229.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 140.248.156.145
serverIP: 2.32.229.108 | Explain this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,95.101.90.115,43.170.88.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,95.101.90.115,43.170.88.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "95.101.90.115",
"serverIP": "43.170.88.26"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,95.101.90.115,43.170.88.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,95.101.90.115,43.170.88.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 95.101.90.115
serverIP: 43.170.88.26 | Explain this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,196.88.117.68,15.215.178.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,196.88.117.68,15.215.178.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "196.88.117.68",
"serverIP": "15.215.178.26"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,196.88.117.68,15.215.178.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,196.88.117.68,15.215.178.26,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417112,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 196.88.117.68
serverIP: 15.215.178.26 | Explain this syslog message |
Subsets and Splits