input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 108.200.128.179
serverIP: 34.73.166.107
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.10.186.173",
"serverIP": "84.75.204.237"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.10.186.173
serverIP: 84.75.204.237
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49152,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "121.70.109.55",
"serverIP": "228.241.150.120"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49152
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 121.70.109.55
serverIP: 228.241.150.120
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49152,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "22.53.192.223",
"serverIP": "142.106.211.185"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49152
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 22.53.192.223
serverIP: 142.106.211.185
|
Explain this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
{
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE",
"RuleID:global",
"ProxyIP:173.252.95.120"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1664206210077 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/comm/SinglePageRegPledge.jsp",
"clientport": 63054,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "3.208.162.111",
"serverIP": "12.149.108.26",
"userName": "-"
}
|
Create a JSON artifact from the message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
Product: Barracuda WAF
Vendor: Barracuda
|
Identify this syslog message
|
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
|
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120']
productids: [0]
sourceinfo: unknown
localstarttime: 1664206210077
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /comm/SinglePageRegPledge.jsp
clientport: 63054
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 3.208.162.111
serverIP: 12.149.108.26
userName: -
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5598,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "181.191.192.243",
"serverIP": "88.182.115.110"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5598
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 181.191.192.243
serverIP: 88.182.115.110
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5598,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.1.49.67",
"serverIP": "225.52.95.62"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5598
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 24.1.49.67
serverIP: 225.52.95.62
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5598,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "107.42.176.53",
"serverIP": "73.247.124.122"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5598
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 107.42.176.53
serverIP: 73.247.124.122
|
Explain this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5598,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "227.243.100.167",
"serverIP": "81.192.118.15"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5598
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 227.243.100.167
serverIP: 81.192.118.15
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "8.71.78.1",
"serverIP": "235.232.198.82"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 8.71.78.1
serverIP: 235.232.198.82
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "116.167.122.102",
"serverIP": "83.107.0.137"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 116.167.122.102
serverIP: 83.107.0.137
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.1.78.18",
"serverIP": "206.115.171.219"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.1.78.18
serverIP: 206.115.171.219
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.179.77.24",
"serverIP": "135.253.51.88"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.179.77.24
serverIP: 135.253.51.88
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29944,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "211.62.45.217",
"serverIP": "38.14.155.104"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29944
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 211.62.45.217
serverIP: 38.14.155.104
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29944,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "223.43.120.67",
"serverIP": "234.141.109.124"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29944
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 223.43.120.67
serverIP: 234.141.109.124
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53323,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54768,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "131.101.242.109",
"serverIP": "189.236.63.40"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53323
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54768
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 131.101.242.109
serverIP: 189.236.63.40
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53323,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54768,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "193.106.130.190",
"serverIP": "114.111.95.118"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53323
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54768
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 193.106.130.190
serverIP: 114.111.95.118
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29944,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.36.82.130",
"serverIP": "207.85.210.220"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29944
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 150.36.82.130
serverIP: 207.85.210.220
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29944,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "1.134.134.183",
"serverIP": "147.23.202.14"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29944
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 1.134.134.183
serverIP: 147.23.202.14
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "15.166.133.243",
"serverIP": "16.91.213.70"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 15.166.133.243
serverIP: 16.91.213.70
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.98.101.28",
"serverIP": "27.242.96.183"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.98.101.28
serverIP: 27.242.96.183
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48339,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 62524,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "206.39.235.107",
"serverIP": "137.11.159.3"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48339
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 62524
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 206.39.235.107
serverIP: 137.11.159.3
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48339,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 62524,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "64.186.234.194",
"serverIP": "194.19.203.118"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48339
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 62524
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 64.186.234.194
serverIP: 194.19.203.118
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43355,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "146.124.60.186",
"serverIP": "68.54.201.221"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43355
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 146.124.60.186
serverIP: 68.54.201.221
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43355,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "91.209.241.60",
"serverIP": "42.180.179.52"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43355
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 91.209.241.60
serverIP: 42.180.179.52
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "137.7.73.182",
"serverIP": "253.29.153.66"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 137.7.73.182
serverIP: 253.29.153.66
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "9.54.21.230",
"serverIP": "223.48.29.76"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 9.54.21.230
serverIP: 223.48.29.76
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11421,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "198.110.243.238",
"serverIP": "136.241.184.149"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11421
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 198.110.243.238
serverIP: 136.241.184.149
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11421,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "220.145.145.230",
"serverIP": "98.13.217.188"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11421
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 220.145.145.230
serverIP: 98.13.217.188
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43355,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "148.255.121.126",
"serverIP": "75.105.246.215"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43355
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 148.255.121.126
serverIP: 75.105.246.215
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43355,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.110.137.34",
"serverIP": "216.156.86.108"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43355
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.110.137.34
serverIP: 216.156.86.108
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11421,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.233.4.116",
"serverIP": "192.154.60.103"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11421
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.233.4.116
serverIP: 192.154.60.103
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11421,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.247.150.15",
"serverIP": "135.47.197.206"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11421
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.247.150.15
serverIP: 135.47.197.206
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28366,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "85.58.74.54",
"serverIP": "16.39.123.145"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28366
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 85.58.74.54
serverIP: 16.39.123.145
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.