<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange IP exiting our network and erasing its logs in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247235#M6647</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42710"&gt;@UNIRIO&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Also just to add onto what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;mentioned already, I'd double check that you have a file blocking profile associated with all external traffic with at least an alert option so you can potentially look into the files that are being transferred going forward. If you're decrypting traffic you'll obviously get drastically more information, but in conjunction with your EDR (assuming that you have one) it can help speed up the process to identify whether the traffic is legitimate or not.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Feb 2026 22:41:53 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2026-02-02T22:41:53Z</dc:date>
    <item>
      <title>Strange IP exiting our network and erasing its logs</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247121#M6635</link>
      <description>&lt;P&gt;Hi everyone! Good Afternoon,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm from Brazil, and my organization have two appliances PA 3220 in HA. This morning we've&amp;nbsp; noticed some suspicious traffic exiting our network with IPv6 ::b638:2a0a:ffff:0 (for example), there was more than one those IPv6. The payload was huge, something about 4.2GB. This can be an exfiltration data attack? Could anyone help us with this doubt?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sincerely,&lt;/P&gt;
&lt;P&gt;André Luiz Guimarães&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 15:07:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247121#M6635</guid>
      <dc:creator>UNIRIO</dc:creator>
      <dc:date>2026-01-30T15:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Strange IP exiting our network and erasing its logs</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247131#M6638</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Do you have machine in your network with IP&amp;nbsp;10.42.56.182 ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This is what&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;::b638:2a0a:ffff:0 refers to in IPv4 format.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Every now and then Palo has a bug where IPv4 IPs show up as IPv6 in reports.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 17:26:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247131#M6638</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-01-30T17:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Strange IP exiting our network and erasing its logs</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247235#M6647</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42710"&gt;@UNIRIO&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Also just to add onto what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;mentioned already, I'd double check that you have a file blocking profile associated with all external traffic with at least an alert option so you can potentially look into the files that are being transferred going forward. If you're decrypting traffic you'll obviously get drastically more information, but in conjunction with your EDR (assuming that you have one) it can help speed up the process to identify whether the traffic is legitimate or not.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 22:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/strange-ip-exiting-our-network-and-erasing-its-logs/m-p/1247235#M6647</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2026-02-02T22:41:53Z</dc:date>
    </item>
  </channel>
</rss>

