<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application and Threat Summary report in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-threat-summary-report/m-p/22218#M16188</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/22578"&gt;OmarKhan&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you trying to figure out the top 5 attackers (in terms of countries) in your threat summary report. If that is the case, we should look at the Top5 source country column. In threat logs as compared to traffic logs, the source (attacker) and destination (victim) definitions are flipped. In your case, &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;10.0.0.0-10.255.255.255&lt;/SPAN&gt; are IP addresses in your LAN network - 10.0.0.0/8 which are referred as victims.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;Traffic log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="127" src="https://live.paloaltonetworks.com/legacyfs/online/10352_pastedImage_0.png" style="width: 1124.86px; height: 127px;" width="1125" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="136" src="https://live.paloaltonetworks.com/legacyfs/online/10354_pastedImage_2.png" style="width: 1124.27px; height: 136px;" width="1124" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, 192.168.0.0-192.168.255.255 are being attacked by an IP address from US : 173.199.132.56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Dec 2013 19:25:44 GMT</pubDate>
    <dc:creator>kadak</dc:creator>
    <dc:date>2013-12-17T19:25:44Z</dc:date>
    <item>
      <title>Application and Threat Summary report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-threat-summary-report/m-p/22217#M16187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i am confused a little bit when i found out that 10.0.0.0-10.255.255.255 is listed in Top 5 Destination country. What actually refers 10.0.0.0-10.255.255.255 in this instance?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 05:47:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-threat-summary-report/m-p/22217#M16187</guid>
      <dc:creator>OmarKhan</dc:creator>
      <dc:date>2013-12-17T05:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: Application and Threat Summary report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-threat-summary-report/m-p/22218#M16188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/22578"&gt;OmarKhan&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you trying to figure out the top 5 attackers (in terms of countries) in your threat summary report. If that is the case, we should look at the Top5 source country column. In threat logs as compared to traffic logs, the source (attacker) and destination (victim) definitions are flipped. In your case, &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;10.0.0.0-10.255.255.255&lt;/SPAN&gt; are IP addresses in your LAN network - 10.0.0.0/8 which are referred as victims.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;Traffic log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="127" src="https://live.paloaltonetworks.com/legacyfs/online/10352_pastedImage_0.png" style="width: 1124.86px; height: 127px;" width="1125" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="136" src="https://live.paloaltonetworks.com/legacyfs/online/10354_pastedImage_2.png" style="width: 1124.27px; height: 136px;" width="1124" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, 192.168.0.0-192.168.255.255 are being attacked by an IP address from US : 173.199.132.56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 19:25:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-threat-summary-report/m-p/22218#M16188</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-12-17T19:25:44Z</dc:date>
    </item>
  </channel>
</rss>

