input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 114.244.96.35
serverIP: 27.19.208.249
|
Explain this syslog message
|
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19842,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.118.37.42",
"serverIP": "201.141.10.22"
}
|
Create a JSON artifact from the message
|
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19842
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 12.118.37.42
serverIP: 201.141.10.22
|
Explain this syslog message
|
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19842,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "14.212.83.104",
"serverIP": "174.125.57.211"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19842
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 14.212.83.104
serverIP: 174.125.57.211
|
Explain this syslog message
|
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19842,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "9.95.157.1",
"serverIP": "64.209.66.106"
}
|
Create a JSON artifact from the message
|
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19842
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 9.95.157.1
serverIP: 64.209.66.106
|
Explain this syslog message
|
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19842,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "102.89.70.30",
"serverIP": "22.102.68.122"
}
|
Create a JSON artifact from the message
|
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19842
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 102.89.70.30
serverIP: 22.102.68.122
|
Explain this syslog message
|
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "226.244.124.185",
"serverIP": "240.37.136.172"
}
|
Create a JSON artifact from the message
|
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 226.244.124.185
serverIP: 240.37.136.172
|
Explain this syslog message
|
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "191.241.97.82",
"serverIP": "49.19.235.207"
}
|
Create a JSON artifact from the message
|
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 191.241.97.82
serverIP: 49.19.235.207
|
Explain this syslog message
|
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.136.48.254",
"serverIP": "252.64.163.56"
}
|
Create a JSON artifact from the message
|
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 172.136.48.254
serverIP: 252.64.163.56
|
Explain this syslog message
|
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.3.239.227",
"serverIP": "59.40.127.33"
}
|
Create a JSON artifact from the message
|
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 90.3.239.227
serverIP: 59.40.127.33
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55064,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "82.178.35.225",
"serverIP": "158.177.255.136"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55064
protocol: 6
streamName: meraki_l7_firewall
clientIP: 82.178.35.225
serverIP: 158.177.255.136
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55064,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "215.78.176.22",
"serverIP": "13.252.99.58"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55064
protocol: 6
streamName: meraki_l7_firewall
clientIP: 215.78.176.22
serverIP: 13.252.99.58
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55064,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "202.102.109.54",
"serverIP": "78.120.115.46"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55064
protocol: 6
streamName: meraki_l7_firewall
clientIP: 202.102.109.54
serverIP: 78.120.115.46
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
|
{
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55064,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "99.121.74.128",
"serverIP": "131.197.32.177"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55064
protocol: 6
streamName: meraki_l7_firewall
clientIP: 99.121.74.128
serverIP: 131.197.32.177
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8178,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42113,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "49.107.121.95",
"serverIP": "94.109.191.3"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8178
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42113
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 49.107.121.95
serverIP: 94.109.191.3
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8178,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42113,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "254.6.49.147",
"serverIP": "23.183.84.189"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8178
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42113
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 254.6.49.147
serverIP: 23.183.84.189
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5353,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.148.115.39",
"serverIP": "186.12.79.100"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5353
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 67.148.115.39
serverIP: 186.12.79.100
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5353,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "41.36.245.253",
"serverIP": "155.76.204.134"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5353
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 41.36.245.253
serverIP: 155.76.204.134
|
Explain this syslog message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5930,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45476,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "74.58.38.87",
"serverIP": "247.230.230.241"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5930
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45476
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 74.58.38.87
serverIP: 247.230.230.241
|
Explain this syslog message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5930,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45476,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "144.74.163.115",
"serverIP": "157.211.172.54"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5930
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45476
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 144.74.163.115
serverIP: 157.211.172.54
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8178,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42113,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "14.234.243.247",
"serverIP": "180.195.162.197"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8178
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42113
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 14.234.243.247
serverIP: 180.195.162.197
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8178,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42113,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "201.73.204.219",
"serverIP": "69.44.235.142"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8178
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42113
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 201.73.204.219
serverIP: 69.44.235.142
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "215.32.94.1",
"serverIP": "0.184.164.151"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 215.32.94.1
serverIP: 0.184.164.151
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "169.156.73.240",
"serverIP": "198.100.189.238"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 169.156.73.240
serverIP: 198.100.189.238
|
Explain this syslog message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47916,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.88.135.163",
"serverIP": "121.248.4.124"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47916
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.88.135.163
serverIP: 121.248.4.124
|
Explain this syslog message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47916,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "211.193.232.137",
"serverIP": "176.78.188.181"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47916
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 211.193.232.137
serverIP: 176.78.188.181
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5060,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56422,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "173.89.47.172",
"serverIP": "67.16.172.232"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5060
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56422
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 173.89.47.172
serverIP: 67.16.172.232
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5060,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56422,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.23.170.163",
"serverIP": "192.173.181.45"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5060
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56422
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 35.23.170.163
serverIP: 192.173.181.45
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "225.64.218.196",
"serverIP": "171.250.35.191"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 225.64.218.196
serverIP: 171.250.35.191
|
Explain this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.165.64.15",
"serverIP": "52.175.143.223"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.165.64.15
serverIP: 52.175.143.223
|
Explain this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "46.127.169.91",
"serverIP": "249.80.151.148"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 46.127.169.91
serverIP: 249.80.151.148
|
Explain this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "71.103.164.244",
"serverIP": "228.220.185.140"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 71.103.164.244
serverIP: 228.220.185.140
|
Explain this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "40.128.248.211",
"serverIP": "153.157.80.46"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 40.128.248.211
serverIP: 153.157.80.46
|
Explain this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12956,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "136.92.248.167",
"serverIP": "48.101.21.162"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12956
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 136.92.248.167
serverIP: 48.101.21.162
|
Explain this syslog message
|
<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44782,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47964,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "69.42.125.68",
"serverIP": "101.56.164.53"
}
|
Create a JSON artifact from the message
|
<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.