input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 114.244.96.35 serverIP: 27.19.208.249
Explain this syslog message
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19842, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "12.118.37.42", "serverIP": "201.141.10.22" }
Create a JSON artifact from the message
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=201.141.10.22 1 1658148290.307810159 M64_MX67C_Augusta flows src=12.118.37.42 dst=201.141.10.22 protocol=tcp sport=53164 dport=19842 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19842 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 12.118.37.42 serverIP: 201.141.10.22
Explain this syslog message
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19842, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "14.212.83.104", "serverIP": "174.125.57.211" }
Create a JSON artifact from the message
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=174.125.57.211 1 1658148290.307810159 M64_MX67C_Augusta flows src=14.212.83.104 dst=174.125.57.211 protocol=tcp sport=53164 dport=19842 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19842 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 14.212.83.104 serverIP: 174.125.57.211
Explain this syslog message
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19842, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "9.95.157.1", "serverIP": "64.209.66.106" }
Create a JSON artifact from the message
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=64.209.66.106 1 1658148290.307810159 M64_MX67C_Augusta flows src=9.95.157.1 dst=64.209.66.106 protocol=tcp sport=53164 dport=19842 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19842 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 9.95.157.1 serverIP: 64.209.66.106
Explain this syslog message
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19842, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "102.89.70.30", "serverIP": "22.102.68.122" }
Create a JSON artifact from the message
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=22.102.68.122 1 1658148290.307810159 M64_MX67C_Augusta flows src=102.89.70.30 dst=22.102.68.122 protocol=tcp sport=53164 dport=19842 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19842 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 102.89.70.30 serverIP: 22.102.68.122
Explain this syslog message
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "226.244.124.185", "serverIP": "240.37.136.172" }
Create a JSON artifact from the message
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=240.37.136.172 1 1658148023.290888999 M64_MX67C_Augusta flows src=226.244.124.185 dst=240.37.136.172 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 226.244.124.185 serverIP: 240.37.136.172
Explain this syslog message
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "191.241.97.82", "serverIP": "49.19.235.207" }
Create a JSON artifact from the message
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=49.19.235.207 1 1658148023.290888999 M64_MX67C_Augusta flows src=191.241.97.82 dst=49.19.235.207 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 191.241.97.82 serverIP: 49.19.235.207
Explain this syslog message
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "172.136.48.254", "serverIP": "252.64.163.56" }
Create a JSON artifact from the message
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=252.64.163.56 1 1658148023.290888999 M64_MX67C_Augusta flows src=172.136.48.254 dst=252.64.163.56 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 172.136.48.254 serverIP: 252.64.163.56
Explain this syslog message
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "90.3.239.227", "serverIP": "59.40.127.33" }
Create a JSON artifact from the message
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=59.40.127.33 1 1658148023.290888999 M64_MX67C_Augusta flows src=90.3.239.227 dst=59.40.127.33 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 90.3.239.227 serverIP: 59.40.127.33
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55064, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "82.178.35.225", "serverIP": "158.177.255.136" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=158.177.255.136 dst=82.178.35.225 protocol=tcp sport=443 dport=55064 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55064 protocol: 6 streamName: meraki_l7_firewall clientIP: 82.178.35.225 serverIP: 158.177.255.136
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55064, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "215.78.176.22", "serverIP": "13.252.99.58" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=13.252.99.58 dst=215.78.176.22 protocol=tcp sport=443 dport=55064 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55064 protocol: 6 streamName: meraki_l7_firewall clientIP: 215.78.176.22 serverIP: 13.252.99.58
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55064, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "202.102.109.54", "serverIP": "78.120.115.46" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=78.120.115.46 dst=202.102.109.54 protocol=tcp sport=443 dport=55064 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55064 protocol: 6 streamName: meraki_l7_firewall clientIP: 202.102.109.54 serverIP: 78.120.115.46
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 55064, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "99.121.74.128", "serverIP": "131.197.32.177" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658101194.862019146 NORDC_MX400_1 l7_firewall src=131.197.32.177 dst=99.121.74.128 protocol=tcp sport=443 dport=55064 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 55064 protocol: 6 streamName: meraki_l7_firewall clientIP: 99.121.74.128 serverIP: 131.197.32.177
Explain this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8178, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42113, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "49.107.121.95", "serverIP": "94.109.191.3" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:49.107.121.95/42113 dst dmz-1:94.109.191.3/8178 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8178 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42113 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 49.107.121.95 serverIP: 94.109.191.3
Explain this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8178, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42113, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "254.6.49.147", "serverIP": "23.183.84.189" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:254.6.49.147/42113 dst dmz-1:23.183.84.189/8178 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8178 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42113 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 254.6.49.147 serverIP: 23.183.84.189
Explain this syslog message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5353, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8080, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.148.115.39", "serverIP": "186.12.79.100" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:67.148.115.39/8080 dst dmz-1:186.12.79.100/5353 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5353 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8080 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 67.148.115.39 serverIP: 186.12.79.100
Explain this syslog message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5353, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8080, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "41.36.245.253", "serverIP": "155.76.204.134" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:18: %ASA-4-106023: Deny udp src outside:41.36.245.253/8080 dst dmz-1:155.76.204.134/5353 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5353 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8080 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 41.36.245.253 serverIP: 155.76.204.134
Explain this syslog message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5930, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45476, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "74.58.38.87", "serverIP": "247.230.230.241" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:74.58.38.87/45476 dst dmz-1:247.230.230.241/5930 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5930 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45476 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 74.58.38.87 serverIP: 247.230.230.241
Explain this syslog message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5930, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45476, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "144.74.163.115", "serverIP": "157.211.172.54" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:35:22: %ASA-4-106023: Deny tcp src outside:144.74.163.115/45476 dst dmz-1:157.211.172.54/5930 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5930 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45476 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 144.74.163.115 serverIP: 157.211.172.54
Explain this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8178, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42113, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "14.234.243.247", "serverIP": "180.195.162.197" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:14.234.243.247/42113 dst dmz-1:180.195.162.197/8178 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8178 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42113 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 14.234.243.247 serverIP: 180.195.162.197
Explain this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8178, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42113, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "201.73.204.219", "serverIP": "69.44.235.142" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:14: %ASA-4-106023: Deny tcp src outside:201.73.204.219/42113 dst dmz-1:69.44.235.142/8178 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8178 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42113 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 201.73.204.219 serverIP: 69.44.235.142
Explain this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "215.32.94.1", "serverIP": "0.184.164.151" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:215.32.94.1/12956 dst dmz-1:0.184.164.151/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 215.32.94.1 serverIP: 0.184.164.151
Explain this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "169.156.73.240", "serverIP": "198.100.189.238" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:169.156.73.240/12956 dst dmz-1:198.100.189.238/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 169.156.73.240 serverIP: 198.100.189.238
Explain this syslog message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 81, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47916, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.88.135.163", "serverIP": "121.248.4.124" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:226.88.135.163/47916 dst dmz-1:121.248.4.124/81 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 81 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47916 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.88.135.163 serverIP: 121.248.4.124
Explain this syslog message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 81, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47916, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "211.193.232.137", "serverIP": "176.78.188.181" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:35:19: %ASA-4-106023: Deny tcp src outside:211.193.232.137/47916 dst dmz-1:176.78.188.181/81 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 81 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47916 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 211.193.232.137 serverIP: 176.78.188.181
Explain this syslog message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5060, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56422, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "173.89.47.172", "serverIP": "67.16.172.232" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:173.89.47.172/56422 dst dmz-1:67.16.172.232/5060 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5060 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56422 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 173.89.47.172 serverIP: 67.16.172.232
Explain this syslog message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5060, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56422, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "35.23.170.163", "serverIP": "192.173.181.45" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:38: %ASA-4-106023: Deny udp src outside:35.23.170.163/56422 dst dmz-1:192.173.181.45/5060 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5060 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56422 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 35.23.170.163 serverIP: 192.173.181.45
Explain this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "225.64.218.196", "serverIP": "171.250.35.191" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:225.64.218.196/12956 dst dmz-1:171.250.35.191/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 225.64.218.196 serverIP: 171.250.35.191
Explain this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "129.165.64.15", "serverIP": "52.175.143.223" }
Create a JSON artifact from the message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 07:36:57: %ASA-4-106023: Deny tcp src outside:129.165.64.15/12956 dst dmz-1:52.175.143.223/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 129.165.64.15 serverIP: 52.175.143.223
Explain this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "46.127.169.91", "serverIP": "249.80.151.148" }
Create a JSON artifact from the message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:46.127.169.91/12956 dst dmz-1:249.80.151.148/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 46.127.169.91 serverIP: 249.80.151.148
Explain this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "71.103.164.244", "serverIP": "228.220.185.140" }
Create a JSON artifact from the message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:71.103.164.244/12956 dst dmz-1:228.220.185.140/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 71.103.164.244 serverIP: 228.220.185.140
Explain this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "40.128.248.211", "serverIP": "153.157.80.46" }
Create a JSON artifact from the message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:40.128.248.211/12956 dst dmz-1:153.157.80.46/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 40.128.248.211 serverIP: 153.157.80.46
Explain this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12956, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "136.92.248.167", "serverIP": "48.101.21.162" }
Create a JSON artifact from the message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 11 2022 05:27:11: %ASA-4-106023: Deny tcp src outside:136.92.248.167/12956 dst dmz-1:48.101.21.162/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12956 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 136.92.248.167 serverIP: 48.101.21.162
Explain this syslog message
<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44782, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47964, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "69.42.125.68", "serverIP": "101.56.164.53" }
Create a JSON artifact from the message
<164>Sep 11 2022 05:27:18: %ASA-4-106023: Deny tcp src outside:101.56.164.53/44782 dst dmz-1:69.42.125.68/47964 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message