There's no universal answer. It all depends on your environment.
In my environment, a high-signal search would be drops from private sources to public destinations. Most of my stuff shouldn't talk out to the Internet directly. Updates are cached locally, and we use internal DNS, NTP, and so on, and we drop those services from most private sources to public. If some random source inside my environment tries to get out to the Internet via services we run internally, that's unusual. It's generally misconfiguration rather than malice, though.
In contrast, drops from random public sources to your systems are generally very low-signal. Tens of thousands of systems scan my environment every day. I want to record that a scan happened, but I don't care that much about the scan traffic which was dropped.
Similarly, geolocation drops are generally very low-signal. I couldn't possibly care less that somebody with a DPRK address tried to connect to my stuff. They wouldn't be allowed. I drop traffic from them (and about 20 other countries) without even logging it, just to reduce the log noise.
Note that traffic out to blocked countries becomes extremely high-signal. If they can't connect in, there should never be any reason for my stuff to connect out.