input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32773
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 225.216.187.11
serverIP: 55.203.140.178
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53776,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.26.37.119",
"serverIP": "21.164.189.119"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:140.26.37.119/53776 dst dmz-1:21.164.189.119/5080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53776
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.26.37.119
serverIP: 21.164.189.119
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53776,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "177.47.136.204",
"serverIP": "238.209.105.49"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:06: %ASA-4-106023: Deny tcp src outside:177.47.136.204/53776 dst dmz-1:238.209.105.49/5080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53776
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 177.47.136.204
serverIP: 238.209.105.49
|
Explain this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 119,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "208.59.92.232",
"serverIP": "59.192.139.74"
}
|
Create a JSON artifact from the message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:208.59.92.232/60000 dst dmz-1:59.192.139.74/119 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 119
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 208.59.92.232
serverIP: 59.192.139.74
|
Explain this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 119,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "233.15.123.85",
"serverIP": "36.24.170.169"
}
|
Create a JSON artifact from the message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:233.15.123.85/60000 dst dmz-1:36.24.170.169/119 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 119
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 233.15.123.85
serverIP: 36.24.170.169
|
Explain this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 119,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "70.129.22.134",
"serverIP": "67.65.134.216"
}
|
Create a JSON artifact from the message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:70.129.22.134/60000 dst dmz-1:67.65.134.216/119 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 119
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 70.129.22.134
serverIP: 67.65.134.216
|
Explain this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 119,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "90.142.229.151",
"serverIP": "32.139.27.185"
}
|
Create a JSON artifact from the message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 01 2023 22:31:13: %ASA-4-106023: Deny tcp src outside:90.142.229.151/60000 dst dmz-1:32.139.27.185/119 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 119
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 90.142.229.151
serverIP: 32.139.27.185
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.79.183.77",
"serverIP": "50.125.127.38"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:157.79.183.77/15102 dst dmz-1:50.125.127.38/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 157.79.183.77
serverIP: 50.125.127.38
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "78.99.60.154",
"serverIP": "170.162.206.250"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:78.99.60.154/15102 dst dmz-1:170.162.206.250/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 78.99.60.154
serverIP: 170.162.206.250
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "179.226.54.53",
"serverIP": "144.194.201.71"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:179.226.54.53/15102 dst dmz-1:144.194.201.71/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 179.226.54.53
serverIP: 144.194.201.71
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.165.143.115",
"serverIP": "214.126.1.225"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:28: %ASA-4-106023: Deny tcp src outside:32.165.143.115/15102 dst dmz-1:214.126.1.225/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 32.165.143.115
serverIP: 214.126.1.225
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "142.50.26.177",
"serverIP": "137.158.115.100"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:142.50.26.177 dst dmz-1:137.158.115.100 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 20
streamName: cisco_asa
clientIP: 142.50.26.177
serverIP: 137.158.115.100
|
Explain this syslog message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "138.51.131.39",
"serverIP": "87.187.14.178"
}
|
Create a JSON artifact from the message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Mar 03 2023 05:09:10: %ASA-4-106023: Deny icmp src outside:138.51.131.39 dst dmz-1:87.187.14.178 (type 3, code 13) by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 20
streamName: cisco_asa
clientIP: 138.51.131.39
serverIP: 87.187.14.178
|
Explain this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleID:global",
"ProxyIP:173.252.95.120"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1664206210077 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/comm/SinglePageRegPledge.jsp",
"clientport": 63054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "10.120.75.117",
"serverIP": "2.100.204.35",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=2.100.204.35 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=10.120.75.117 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=10.120.75.117 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120']
productids: [0]
sourceinfo: unknown
localstarttime: 1664206210077
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /comm/SinglePageRegPledge.jsp
clientport: 63054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 10.120.75.117
serverIP: 2.100.204.35
userName: -
|
Explain this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleID:global",
"ProxyIP:173.252.95.120"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1664206210077 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/comm/SinglePageRegPledge.jsp",
"clientport": 63054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "126.181.86.188",
"serverIP": "26.218.214.101",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=26.218.214.101 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=126.181.86.188 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=126.181.86.188 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120']
productids: [0]
sourceinfo: unknown
localstarttime: 1664206210077
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /comm/SinglePageRegPledge.jsp
clientport: 63054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 126.181.86.188
serverIP: 26.218.214.101
userName: -
|
Explain this syslog message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48349,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57649,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "57.29.144.84",
"serverIP": "212.171.51.94"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:212.171.51.94/48349 dst dmz-1:57.29.144.84/57649 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48349
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57649
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 57.29.144.84
serverIP: 212.171.51.94
|
Explain this syslog message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48349,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57649,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "81.101.155.31",
"serverIP": "27.169.159.106"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:49:56: %ASA-4-106023: Deny tcp src outside:27.169.159.106/48349 dst dmz-1:81.101.155.31/57649 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48349
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57649
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 81.101.155.31
serverIP: 27.169.159.106
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1527,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58546,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "105.93.229.87",
"serverIP": "133.140.154.107"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:105.93.229.87/58546 dst dmz-1:133.140.154.107/1527 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1527
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58546
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 105.93.229.87
serverIP: 133.140.154.107
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1527,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58546,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "213.35.236.13",
"serverIP": "238.100.109.14"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:07: %ASA-4-106023: Deny tcp src outside:213.35.236.13/58546 dst dmz-1:238.100.109.14/1527 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1527
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58546
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 213.35.236.13
serverIP: 238.100.109.14
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23406,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "60.205.76.82",
"serverIP": "238.47.8.35"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:238.47.8.35/23406 dst dmz-1:60.205.76.82/56741 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23406
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 60.205.76.82
serverIP: 238.47.8.35
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23406,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.40.250.119",
"serverIP": "204.49.244.72"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:204.49.244.72/23406 dst dmz-1:228.40.250.119/56741 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23406
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.40.250.119
serverIP: 204.49.244.72
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23406,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "224.115.10.87",
"serverIP": "87.81.216.190"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:87.81.216.190/23406 dst dmz-1:224.115.10.87/56741 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23406
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 224.115.10.87
serverIP: 87.81.216.190
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23406,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "143.197.212.129",
"serverIP": "177.52.112.214"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:10: %ASA-4-106023: Deny tcp src outside:177.52.112.214/23406 dst dmz-1:143.197.212.129/56741 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23406
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 143.197.212.129
serverIP: 177.52.112.214
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "194.192.227.138",
"serverIP": "234.19.126.215"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:194.192.227.138/55045 dst dmz-1:234.19.126.215/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 194.192.227.138
serverIP: 234.19.126.215
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "68.40.187.208",
"serverIP": "248.178.66.70"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:68.40.187.208/55045 dst dmz-1:248.178.66.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 68.40.187.208
serverIP: 248.178.66.70
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "222.39.43.47",
"serverIP": "56.168.155.165"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:222.39.43.47/55045 dst dmz-1:56.168.155.165/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 222.39.43.47
serverIP: 56.168.155.165
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "84.24.174.230",
"serverIP": "32.62.255.175"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:16: %ASA-4-106023: Deny tcp src outside:84.24.174.230/55045 dst dmz-1:32.62.255.175/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 84.24.174.230
serverIP: 32.62.255.175
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51952,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55150,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "70.101.173.10",
"serverIP": "184.39.233.184"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:184.39.233.184/51952 dst dmz-1:70.101.173.10/55150 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51952
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55150
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 70.101.173.10
serverIP: 184.39.233.184
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51952,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55150,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "135.207.82.88",
"serverIP": "43.95.14.26"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.95.14.26/51952 dst dmz-1:135.207.82.88/55150 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51952
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55150
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 135.207.82.88
serverIP: 43.95.14.26
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51952,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55150,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "100.238.84.74",
"serverIP": "3.214.60.43"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:3.214.60.43/51952 dst dmz-1:100.238.84.74/55150 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51952
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55150
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 100.238.84.74
serverIP: 3.214.60.43
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51952,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55150,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "107.34.243.213",
"serverIP": "43.123.7.46"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:37: %ASA-4-106023: Deny tcp src outside:43.123.7.46/51952 dst dmz-1:107.34.243.213/55150 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51952
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55150
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 107.34.243.213
serverIP: 43.123.7.46
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "166.113.238.2",
"serverIP": "200.81.90.129"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:166.113.238.2/36343 dst dmz-1:200.81.90.129/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 166.113.238.2
serverIP: 200.81.90.129
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "212.249.11.55",
"serverIP": "195.188.88.138"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:212.249.11.55/36343 dst dmz-1:195.188.88.138/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 212.249.11.55
serverIP: 195.188.88.138
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "108.200.128.179",
"serverIP": "34.73.166.107"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.