The log shows TCP, UDP or ICMP packet dropped messages
03/26/2020 21 14116
DESCRIPTION: The log shows TCP, UDP or ICMP packet dropped messages
TCP, UDP and ICMP packet drops from the WAN (seen in firewall logs) are due to a constant stream of both innocent and malicious attempts to gain entry to your network.
You can get a sense for the overall patterns of this by looking at www.dshield.org. They collate firewall log data from around the world and give statistical summaries for the most attacked ports/protocols. The most commonly attacked ports for the last few years are 135, 137, 80, 1434 and 445. In all cases, the malicious exploits relate to major security holes in Windows hosts (which may be fixed in the latest hotfixes).