input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32773 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 225.216.187.11 serverIP: 55.203.140.178
Explain this syslog message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53776, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "140.26.37.119", "serverIP": "21.164.189.119" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53776 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 140.26.37.119 serverIP: 21.164.189.119
Explain this syslog message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53776, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "177.47.136.204", "serverIP": "238.209.105.49" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53776 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 177.47.136.204 serverIP: 238.209.105.49
Explain this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 119, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "208.59.92.232", "serverIP": "59.192.139.74" }
Create a JSON artifact from the message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 119 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 208.59.92.232 serverIP: 59.192.139.74
Explain this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 119, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "233.15.123.85", "serverIP": "36.24.170.169" }
Create a JSON artifact from the message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 119 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 233.15.123.85 serverIP: 36.24.170.169
Explain this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 119, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "70.129.22.134", "serverIP": "67.65.134.216" }
Create a JSON artifact from the message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 119 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 70.129.22.134 serverIP: 67.65.134.216
Explain this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 119, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "90.142.229.151", "serverIP": "32.139.27.185" }
Create a JSON artifact from the message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 119 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 90.142.229.151 serverIP: 32.139.27.185
Explain this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "157.79.183.77", "serverIP": "50.125.127.38" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 157.79.183.77 serverIP: 50.125.127.38
Explain this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "78.99.60.154", "serverIP": "170.162.206.250" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 78.99.60.154 serverIP: 170.162.206.250
Explain this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "179.226.54.53", "serverIP": "144.194.201.71" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 179.226.54.53 serverIP: 144.194.201.71
Explain this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "32.165.143.115", "serverIP": "214.126.1.225" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 32.165.143.115 serverIP: 214.126.1.225
Explain this syslog message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "142.50.26.177", "serverIP": "137.158.115.100" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 20 streamName: cisco_asa clientIP: 142.50.26.177 serverIP: 137.158.115.100
Explain this syslog message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "138.51.131.39", "serverIP": "87.187.14.178" }
Create a JSON artifact from the message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 20 streamName: cisco_asa clientIP: 138.51.131.39 serverIP: 87.187.14.178
Explain this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleID:global", "ProxyIP:173.252.95.120" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1664206210077 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/comm/SinglePageRegPledge.jsp", "clientport": 63054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "10.120.75.117", "serverIP": "2.100.204.35", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120'] productids: [0] sourceinfo: unknown localstarttime: 1664206210077 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /comm/SinglePageRegPledge.jsp clientport: 63054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 10.120.75.117 serverIP: 2.100.204.35 userName: -
Explain this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleID:global", "ProxyIP:173.252.95.120" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1664206210077 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/comm/SinglePageRegPledge.jsp", "clientport": 63054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "126.181.86.188", "serverIP": "26.218.214.101", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120'] productids: [0] sourceinfo: unknown localstarttime: 1664206210077 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /comm/SinglePageRegPledge.jsp clientport: 63054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 126.181.86.188 serverIP: 26.218.214.101 userName: -
Explain this syslog message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48349, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57649, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "57.29.144.84", "serverIP": "212.171.51.94" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48349 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57649 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 57.29.144.84 serverIP: 212.171.51.94
Explain this syslog message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48349, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57649, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "81.101.155.31", "serverIP": "27.169.159.106" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48349 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57649 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 81.101.155.31 serverIP: 27.169.159.106
Explain this syslog message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1527, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58546, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "105.93.229.87", "serverIP": "133.140.154.107" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1527 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58546 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 105.93.229.87 serverIP: 133.140.154.107
Explain this syslog message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1527, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58546, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "213.35.236.13", "serverIP": "238.100.109.14" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1527 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58546 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 213.35.236.13 serverIP: 238.100.109.14
Explain this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23406, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "60.205.76.82", "serverIP": "238.47.8.35" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23406 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 60.205.76.82 serverIP: 238.47.8.35
Explain this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23406, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "228.40.250.119", "serverIP": "204.49.244.72" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23406 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 228.40.250.119 serverIP: 204.49.244.72
Explain this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23406, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "224.115.10.87", "serverIP": "87.81.216.190" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23406 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 224.115.10.87 serverIP: 87.81.216.190
Explain this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23406, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "143.197.212.129", "serverIP": "177.52.112.214" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23406 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 143.197.212.129 serverIP: 177.52.112.214
Explain this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "194.192.227.138", "serverIP": "234.19.126.215" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 194.192.227.138 serverIP: 234.19.126.215
Explain this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "68.40.187.208", "serverIP": "248.178.66.70" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 68.40.187.208 serverIP: 248.178.66.70
Explain this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "222.39.43.47", "serverIP": "56.168.155.165" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 222.39.43.47 serverIP: 56.168.155.165
Explain this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "84.24.174.230", "serverIP": "32.62.255.175" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 84.24.174.230 serverIP: 32.62.255.175
Explain this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51952, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55150, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "70.101.173.10", "serverIP": "184.39.233.184" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51952 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55150 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 70.101.173.10 serverIP: 184.39.233.184
Explain this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51952, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55150, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "135.207.82.88", "serverIP": "43.95.14.26" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51952 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55150 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 135.207.82.88 serverIP: 43.95.14.26
Explain this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51952, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55150, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "100.238.84.74", "serverIP": "3.214.60.43" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51952 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55150 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 100.238.84.74 serverIP: 3.214.60.43
Explain this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51952, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55150, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "107.34.243.213", "serverIP": "43.123.7.46" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51952 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55150 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 107.34.243.213 serverIP: 43.123.7.46
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "166.113.238.2", "serverIP": "200.81.90.129" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 166.113.238.2 serverIP: 200.81.90.129
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "212.249.11.55", "serverIP": "195.188.88.138" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 212.249.11.55 serverIP: 195.188.88.138
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "108.200.128.179", "serverIP": "34.73.166.107" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message