input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
2 550132162628 eni-04bba01e1f04708a4 18.146.251.46 5.73.212.8 51289 23 6 1 40 1665117116 1665117143 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 23
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117143
starttimeutc: 1665117116
messagetype: network_flow_data
clientport: 51289
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 18.146.251.46
serverIP: 5.73.212.8
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 183.215.166.201 12.148.75.186 51289 23 6 1 40 1665117116 1665117143 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 23,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 183.215.166.201 12.148.75.186 51289 23 6 1 40 1665117116 1665117143 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117143",
"starttimeutc": "1665117116",
"messagetype": "network_flow_data",
"clientport": 51289,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "183.215.166.201",
"serverIP": "12.148.75.186"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 183.215.166.201 12.148.75.186 51289 23 6 1 40 1665117116 1665117143 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 183.215.166.201 12.148.75.186 51289 23 6 1 40 1665117116 1665117143 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 23
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117143
starttimeutc: 1665117116
messagetype: network_flow_data
clientport: 51289
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 183.215.166.201
serverIP: 12.148.75.186
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 76.40.229.237 125.99.126.33 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 3563,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 76.40.229.237 125.99.126.33 53029 3563 6 1 44 1665117145 1665117171 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117171",
"starttimeutc": "1665117145",
"messagetype": "network_flow_data",
"clientport": 53029,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "76.40.229.237",
"serverIP": "125.99.126.33"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 76.40.229.237 125.99.126.33 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 76.40.229.237 125.99.126.33 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 3563
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117171
starttimeutc: 1665117145
messagetype: network_flow_data
clientport: 53029
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 76.40.229.237
serverIP: 125.99.126.33
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 248.232.252.126 64.19.255.103 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 3563,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 248.232.252.126 64.19.255.103 53029 3563 6 1 44 1665117145 1665117171 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117171",
"starttimeutc": "1665117145",
"messagetype": "network_flow_data",
"clientport": 53029,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "248.232.252.126",
"serverIP": "64.19.255.103"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 248.232.252.126 64.19.255.103 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 248.232.252.126 64.19.255.103 53029 3563 6 1 44 1665117145 1665117171 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 3563
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117171
starttimeutc: 1665117145
messagetype: network_flow_data
clientport: 53029
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 248.232.252.126
serverIP: 64.19.255.103
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 179.134.17.194 109.129.54.171 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 115,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 179.134.17.194 109.129.54.171 49319 115 6 1 40 1665117145 1665117171 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117171",
"starttimeutc": "1665117145",
"messagetype": "network_flow_data",
"clientport": 49319,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "179.134.17.194",
"serverIP": "109.129.54.171"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 179.134.17.194 109.129.54.171 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 179.134.17.194 109.129.54.171 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 115
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117171
starttimeutc: 1665117145
messagetype: network_flow_data
clientport: 49319
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 179.134.17.194
serverIP: 109.129.54.171
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 72.176.181.168 185.123.120.206 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 115,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 72.176.181.168 185.123.120.206 49319 115 6 1 40 1665117145 1665117171 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117171",
"starttimeutc": "1665117145",
"messagetype": "network_flow_data",
"clientport": 49319,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "72.176.181.168",
"serverIP": "185.123.120.206"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 72.176.181.168 185.123.120.206 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 72.176.181.168 185.123.120.206 49319 115 6 1 40 1665117145 1665117171 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 115
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117171
starttimeutc: 1665117145
messagetype: network_flow_data
clientport: 49319
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 72.176.181.168
serverIP: 185.123.120.206
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 200.203.92.255 217.0.137.73 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 7942,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 200.203.92.255 217.0.137.73 40632 7942 6 1 40 1665117173 1665117203 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117203",
"starttimeutc": "1665117173",
"messagetype": "network_flow_data",
"clientport": 40632,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "200.203.92.255",
"serverIP": "217.0.137.73"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 200.203.92.255 217.0.137.73 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 200.203.92.255 217.0.137.73 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 7942
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117203
starttimeutc: 1665117173
messagetype: network_flow_data
clientport: 40632
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 200.203.92.255
serverIP: 217.0.137.73
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 66.130.214.197 18.178.120.34 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 7942,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 66.130.214.197 18.178.120.34 40632 7942 6 1 40 1665117173 1665117203 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117203",
"starttimeutc": "1665117173",
"messagetype": "network_flow_data",
"clientport": 40632,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "66.130.214.197",
"serverIP": "18.178.120.34"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 66.130.214.197 18.178.120.34 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 66.130.214.197 18.178.120.34 40632 7942 6 1 40 1665117173 1665117203 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 7942
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117203
starttimeutc: 1665117173
messagetype: network_flow_data
clientport: 40632
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 66.130.214.197
serverIP: 18.178.120.34
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 99.56.90.85 15.178.79.228 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 1022,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 99.56.90.85 15.178.79.228 58996 1022 6 1 40 1665117204 1665117233 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117233",
"starttimeutc": "1665117204",
"messagetype": "network_flow_data",
"clientport": 58996,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "99.56.90.85",
"serverIP": "15.178.79.228"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 99.56.90.85 15.178.79.228 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 99.56.90.85 15.178.79.228 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 1022
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117233
starttimeutc: 1665117204
messagetype: network_flow_data
clientport: 58996
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 99.56.90.85
serverIP: 15.178.79.228
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 178.185.148.91 202.158.3.245 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 1022,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 178.185.148.91 202.158.3.245 58996 1022 6 1 40 1665117204 1665117233 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117233",
"starttimeutc": "1665117204",
"messagetype": "network_flow_data",
"clientport": 58996,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "178.185.148.91",
"serverIP": "202.158.3.245"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 178.185.148.91 202.158.3.245 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 178.185.148.91 202.158.3.245 58996 1022 6 1 40 1665117204 1665117233 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 1022
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117233
starttimeutc: 1665117204
messagetype: network_flow_data
clientport: 58996
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 178.185.148.91
serverIP: 202.158.3.245
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 156.177.136.150 84.39.20.234 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 23451,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 45,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 156.177.136.150 84.39.20.234 23451 47808 17 1 45 1665117263 1665117293 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117293",
"starttimeutc": "1665117263",
"messagetype": "network_flow_data",
"clientport": 47808,
"protocol": 17,
"streamName": "aws_vpc_flow_log",
"clientIP": "84.39.20.234",
"serverIP": "156.177.136.150"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 156.177.136.150 84.39.20.234 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 156.177.136.150 84.39.20.234 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 23451
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 45
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117293
starttimeutc: 1665117263
messagetype: network_flow_data
clientport: 47808
protocol: 17
streamName: aws_vpc_flow_log
clientIP: 84.39.20.234
serverIP: 156.177.136.150
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 104.244.53.212 56.113.8.8 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 23451,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 45,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 104.244.53.212 56.113.8.8 23451 47808 17 1 45 1665117263 1665117293 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117293",
"starttimeutc": "1665117263",
"messagetype": "network_flow_data",
"clientport": 47808,
"protocol": 17,
"streamName": "aws_vpc_flow_log",
"clientIP": "56.113.8.8",
"serverIP": "104.244.53.212"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 104.244.53.212 56.113.8.8 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 104.244.53.212 56.113.8.8 23451 47808 17 1 45 1665117263 1665117293 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 23451
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 45
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117293
starttimeutc: 1665117263
messagetype: network_flow_data
clientport: 47808
protocol: 17
streamName: aws_vpc_flow_log
clientIP: 56.113.8.8
serverIP: 104.244.53.212
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 110.241.248.42 212.47.79.207 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 8088,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 110.241.248.42 212.47.79.207 57295 8088 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "110.241.248.42",
"serverIP": "212.47.79.207"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 110.241.248.42 212.47.79.207 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 110.241.248.42 212.47.79.207 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 8088
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 110.241.248.42
serverIP: 212.47.79.207
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 129.59.74.80 0.68.13.224 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 8088,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 129.59.74.80 0.68.13.224 57295 8088 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "129.59.74.80",
"serverIP": "0.68.13.224"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 129.59.74.80 0.68.13.224 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 129.59.74.80 0.68.13.224 57295 8088 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 8088
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 129.59.74.80
serverIP: 0.68.13.224
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 12.137.52.242 159.178.12.90 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 3389,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 12.137.52.242 159.178.12.90 57295 3389 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "12.137.52.242",
"serverIP": "159.178.12.90"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 12.137.52.242 159.178.12.90 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 12.137.52.242 159.178.12.90 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 3389
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 12.137.52.242
serverIP: 159.178.12.90
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 124.134.221.131 118.161.140.195 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 3389,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 124.134.221.131 118.161.140.195 57295 3389 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "124.134.221.131",
"serverIP": "118.161.140.195"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 124.134.221.131 118.161.140.195 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 124.134.221.131 118.161.140.195 57295 3389 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 3389
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 124.134.221.131
serverIP: 118.161.140.195
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 189.60.71.72 132.58.250.141 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 5001,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 189.60.71.72 132.58.250.141 57295 5001 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "189.60.71.72",
"serverIP": "132.58.250.141"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 189.60.71.72 132.58.250.141 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 189.60.71.72 132.58.250.141 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 5001
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 189.60.71.72
serverIP: 132.58.250.141
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 69.66.210.9 234.205.100.33 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 5001,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 69.66.210.9 234.205.100.33 57295 5001 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "69.66.210.9",
"serverIP": "234.205.100.33"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 69.66.210.9 234.205.100.33 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 69.66.210.9 234.205.100.33 57295 5001 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 5001
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 69.66.210.9
serverIP: 234.205.100.33
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 5.59.173.71 94.35.232.42 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 7443,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 5.59.173.71 94.35.232.42 57295 7443 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "5.59.173.71",
"serverIP": "94.35.232.42"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 5.59.173.71 94.35.232.42 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 5.59.173.71 94.35.232.42 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 7443
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 5.59.173.71
serverIP: 94.35.232.42
|
Explain this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 87.156.49.217 150.219.58.159 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
{
"senderhost": "eni-04bba01e1f04708a4-reject",
"serverport": 7443,
"tags": [
"550132162628",
"eni-04bba01e1f04708a4",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"productids": [
92,
0
],
"sourceinfo": "unknown",
"message": "2 550132162628 eni-04bba01e1f04708a4 87.156.49.217 150.219.58.159 57295 7443 6 1 40 1665117295 1665117322 REJECT OK",
"action": "block",
"sensitivity": "normal",
"endtimeutc": "1665117322",
"starttimeutc": "1665117295",
"messagetype": "network_flow_data",
"clientport": 57295,
"protocol": 6,
"streamName": "aws_vpc_flow_log",
"clientIP": "87.156.49.217",
"serverIP": "150.219.58.159"
}
|
Create a JSON artifact from the message
|
2 550132162628 eni-04bba01e1f04708a4 87.156.49.217 150.219.58.159 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 550132162628 eni-04bba01e1f04708a4 87.156.49.217 150.219.58.159 57295 7443 6 1 40 1665117295 1665117322 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
senderhost: eni-04bba01e1f04708a4-reject
serverport: 7443
tags: ['550132162628', 'eni-04bba01e1f04708a4', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
productids: [92, 0]
sourceinfo: unknown
action: block
sensitivity: normal
endtimeutc: 1665117322
starttimeutc: 1665117295
messagetype: network_flow_data
clientport: 57295
protocol: 6
streamName: aws_vpc_flow_log
clientIP: 87.156.49.217
serverIP: 150.219.58.159
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:163.24.39.32/54527 dst dmz-1:191.88.101.61/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:163.24.39.32/54527 dst dmz-1:191.88.101.61/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "163.24.39.32",
"serverIP": "191.88.101.61"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:163.24.39.32/54527 dst dmz-1:191.88.101.61/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:163.24.39.32/54527 dst dmz-1:191.88.101.61/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 163.24.39.32
serverIP: 191.88.101.61
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:2.185.162.34/54527 dst dmz-1:87.82.111.165/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:2.185.162.34/54527 dst dmz-1:87.82.111.165/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.185.162.34",
"serverIP": "87.82.111.165"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:2.185.162.34/54527 dst dmz-1:87.82.111.165/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:2.185.162.34/54527 dst dmz-1:87.82.111.165/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.185.162.34
serverIP: 87.82.111.165
|
Explain this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.123.62.185/55707 dst dmz-1:251.119.189.242/45005 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45005,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.123.62.185/55707 dst dmz-1:251.119.189.242/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55707,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.123.62.185",
"serverIP": "251.119.189.242"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.123.62.185/55707 dst dmz-1:251.119.189.242/45005 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.123.62.185/55707 dst dmz-1:251.119.189.242/45005 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45005
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55707
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.123.62.185
serverIP: 251.119.189.242
|
Explain this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:151.246.252.44/55707 dst dmz-1:44.170.61.244/45005 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45005,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:151.246.252.44/55707 dst dmz-1:44.170.61.244/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55707,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "151.246.252.44",
"serverIP": "44.170.61.244"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:151.246.252.44/55707 dst dmz-1:44.170.61.244/45005 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:151.246.252.44/55707 dst dmz-1:44.170.61.244/45005 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45005
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55707
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 151.246.252.44
serverIP: 44.170.61.244
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:238.128.84.147/54527 dst dmz-1:40.235.148.198/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:238.128.84.147/54527 dst dmz-1:40.235.148.198/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "238.128.84.147",
"serverIP": "40.235.148.198"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:238.128.84.147/54527 dst dmz-1:40.235.148.198/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:238.128.84.147/54527 dst dmz-1:40.235.148.198/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 238.128.84.147
serverIP: 40.235.148.198
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:79.210.84.150/54527 dst dmz-1:98.244.143.185/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:79.210.84.150/54527 dst dmz-1:98.244.143.185/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.210.84.150",
"serverIP": "98.244.143.185"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:79.210.84.150/54527 dst dmz-1:98.244.143.185/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:79.210.84.150/54527 dst dmz-1:98.244.143.185/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.210.84.150
serverIP: 98.244.143.185
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:34.255.78.191/56484 dst dmz-1:233.23.133.41/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:34.255.78.191/56484 dst dmz-1:233.23.133.41/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "34.255.78.191",
"serverIP": "233.23.133.41"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:34.255.78.191/56484 dst dmz-1:233.23.133.41/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:34.255.78.191/56484 dst dmz-1:233.23.133.41/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 34.255.78.191
serverIP: 233.23.133.41
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:141.251.57.248/56484 dst dmz-1:198.193.171.121/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:141.251.57.248/56484 dst dmz-1:198.193.171.121/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.251.57.248",
"serverIP": "198.193.171.121"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:141.251.57.248/56484 dst dmz-1:198.193.171.121/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:141.251.57.248/56484 dst dmz-1:198.193.171.121/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.251.57.248
serverIP: 198.193.171.121
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:250.215.38.37/56484 dst dmz-1:38.95.113.21/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:250.215.38.37/56484 dst dmz-1:38.95.113.21/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "250.215.38.37",
"serverIP": "38.95.113.21"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:250.215.38.37/56484 dst dmz-1:38.95.113.21/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:250.215.38.37/56484 dst dmz-1:38.95.113.21/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 250.215.38.37
serverIP: 38.95.113.21
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:119.206.59.218/56484 dst dmz-1:125.28.61.229/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:119.206.59.218/56484 dst dmz-1:125.28.61.229/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.206.59.218",
"serverIP": "125.28.61.229"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:119.206.59.218/56484 dst dmz-1:125.28.61.229/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:41: %ASA-4-106023: Deny tcp src outside:119.206.59.218/56484 dst dmz-1:125.28.61.229/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.206.59.218
serverIP: 125.28.61.229
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:198.233.155.240/52870 dst dmz-1:7.155.157.127/10259 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10259,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:198.233.155.240/52870 dst dmz-1:7.155.157.127/10259 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52870,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "198.233.155.240",
"serverIP": "7.155.157.127"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:198.233.155.240/52870 dst dmz-1:7.155.157.127/10259 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:198.233.155.240/52870 dst dmz-1:7.155.157.127/10259 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10259
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52870
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 198.233.155.240
serverIP: 7.155.157.127
|
Explain this syslog message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:223.252.28.71/52870 dst dmz-1:181.107.34.113/10259 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10259,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:223.252.28.71/52870 dst dmz-1:181.107.34.113/10259 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52870,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "223.252.28.71",
"serverIP": "181.107.34.113"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:223.252.28.71/52870 dst dmz-1:181.107.34.113/10259 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:58:32: %ASA-4-106023: Deny tcp src outside:223.252.28.71/52870 dst dmz-1:181.107.34.113/10259 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10259
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52870
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 223.252.28.71
serverIP: 181.107.34.113
|
Explain this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:79.206.48.143/56484 dst dmz-1:185.218.231.92/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:79.206.48.143/56484 dst dmz-1:185.218.231.92/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.206.48.143",
"serverIP": "185.218.231.92"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:79.206.48.143/56484 dst dmz-1:185.218.231.92/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:79.206.48.143/56484 dst dmz-1:185.218.231.92/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.206.48.143
serverIP: 185.218.231.92
|
Explain this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:38.81.86.4/56484 dst dmz-1:153.192.16.200/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:38.81.86.4/56484 dst dmz-1:153.192.16.200/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.81.86.4",
"serverIP": "153.192.16.200"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:38.81.86.4/56484 dst dmz-1:153.192.16.200/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:38.81.86.4/56484 dst dmz-1:153.192.16.200/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 38.81.86.4
serverIP: 153.192.16.200
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.