input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:108.200.128.179/36343 dst dmz-1:34.73.166.107/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 108.200.128.179 serverIP: 34.73.166.107
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "65.10.186.173", "serverIP": "84.75.204.237" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:65.10.186.173/36343 dst dmz-1:84.75.204.237/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 65.10.186.173 serverIP: 84.75.204.237
Explain this syslog message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49152, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "121.70.109.55", "serverIP": "228.241.150.120" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:228.241.150.120/45984 dst dmz-1:121.70.109.55/49152 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49152 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 121.70.109.55 serverIP: 228.241.150.120
Explain this syslog message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49152, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "22.53.192.223", "serverIP": "142.106.211.185" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:14: %ASA-4-106023: Deny tcp src outside:142.106.211.185/45984 dst dmz-1:22.53.192.223/49152 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49152 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 22.53.192.223 serverIP: 142.106.211.185
Explain this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE", "RuleID:global", "ProxyIP:173.252.95.120" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser=\"-\" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1664206210077 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/comm/SinglePageRegPledge.jsp", "clientport": 63054, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "3.208.162.111", "serverIP": "12.149.108.26", "userName": "-" }
Create a JSON artifact from the message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Sep 26 10:30:10 WAFirewall CEF:0|Barracuda|WAF|1101|342|GEO_IP_BLOCK|1|cat=WF dst=12.149.108.26 dpt=443 act=DENY msg=[Fake Crawler] duser="-" src=3.208.162.111 spt=63054 requestMethod=GET app=TLSv1.3 requestContext="-" start=Sep 26 2022 10:30:10 rt=1664206210077 request=/comm/SinglePageRegPledge.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=1837a6b83df-dec0665f cn2=63054 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=3.208.162.111 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE', 'RuleID:global', 'ProxyIP:173.252.95.120'] productids: [0] sourceinfo: unknown localstarttime: 1664206210077 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /comm/SinglePageRegPledge.jsp clientport: 63054 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 3.208.162.111 serverIP: 12.149.108.26 userName: -
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5598, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "181.191.192.243", "serverIP": "88.182.115.110" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:181.191.192.243/46629 dst dmz-1:88.182.115.110/5598 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5598 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 181.191.192.243 serverIP: 88.182.115.110
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5598, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "24.1.49.67", "serverIP": "225.52.95.62" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:24.1.49.67/46629 dst dmz-1:225.52.95.62/5598 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5598 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 24.1.49.67 serverIP: 225.52.95.62
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5598, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "107.42.176.53", "serverIP": "73.247.124.122" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:107.42.176.53/46629 dst dmz-1:73.247.124.122/5598 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5598 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 107.42.176.53 serverIP: 73.247.124.122
Explain this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5598, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "227.243.100.167", "serverIP": "81.192.118.15" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:50:51: %ASA-4-106023: Deny tcp src outside:227.243.100.167/46629 dst dmz-1:81.192.118.15/5598 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5598 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 227.243.100.167 serverIP: 81.192.118.15
Explain this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "8.71.78.1", "serverIP": "235.232.198.82" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:8.71.78.1/55533 dst dmz-1:235.232.198.82/1723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 8.71.78.1 serverIP: 235.232.198.82
Explain this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "116.167.122.102", "serverIP": "83.107.0.137" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:116.167.122.102/55533 dst dmz-1:83.107.0.137/1723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 116.167.122.102 serverIP: 83.107.0.137
Explain this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "140.1.78.18", "serverIP": "206.115.171.219" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:140.1.78.18/55533 dst dmz-1:206.115.171.219/1723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 140.1.78.18 serverIP: 206.115.171.219
Explain this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.179.77.24", "serverIP": "135.253.51.88" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:07: %ASA-4-106023: Deny tcp src outside:200.179.77.24/55533 dst dmz-1:135.253.51.88/1723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.179.77.24 serverIP: 135.253.51.88
Explain this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29944, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "211.62.45.217", "serverIP": "38.14.155.104" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:211.62.45.217/29944 dst dmz-1:38.14.155.104/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29944 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 211.62.45.217 serverIP: 38.14.155.104
Explain this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29944, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "223.43.120.67", "serverIP": "234.141.109.124" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:223.43.120.67/29944 dst dmz-1:234.141.109.124/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29944 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 223.43.120.67 serverIP: 234.141.109.124
Explain this syslog message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53323, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54768, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "131.101.242.109", "serverIP": "189.236.63.40" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:189.236.63.40/53323 dst dmz-1:131.101.242.109/54768 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53323 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54768 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 131.101.242.109 serverIP: 189.236.63.40
Explain this syslog message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53323, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54768, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "193.106.130.190", "serverIP": "114.111.95.118" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:00: %ASA-4-106023: Deny tcp src outside:114.111.95.118/53323 dst dmz-1:193.106.130.190/54768 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53323 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54768 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 193.106.130.190 serverIP: 114.111.95.118
Explain this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29944, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "150.36.82.130", "serverIP": "207.85.210.220" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:150.36.82.130/29944 dst dmz-1:207.85.210.220/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29944 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 150.36.82.130 serverIP: 207.85.210.220
Explain this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29944, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "1.134.134.183", "serverIP": "147.23.202.14" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:05: %ASA-4-106023: Deny udp src outside:1.134.134.183/29944 dst dmz-1:147.23.202.14/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29944 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 1.134.134.183 serverIP: 147.23.202.14
Explain this syslog message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "15.166.133.243", "serverIP": "16.91.213.70" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:15.166.133.243/36690 dst dmz-1:16.91.213.70/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 15.166.133.243 serverIP: 16.91.213.70
Explain this syslog message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.98.101.28", "serverIP": "27.242.96.183" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:36: %ASA-4-106023: Deny tcp src outside:174.98.101.28/36690 dst dmz-1:27.242.96.183/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.98.101.28 serverIP: 27.242.96.183
Explain this syslog message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48339, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 62524, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "206.39.235.107", "serverIP": "137.11.159.3" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:137.11.159.3/48339 dst dmz-1:206.39.235.107/62524 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48339 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 62524 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 206.39.235.107 serverIP: 137.11.159.3
Explain this syslog message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48339, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 62524, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "64.186.234.194", "serverIP": "194.19.203.118" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:35: %ASA-4-106023: Deny tcp src outside:194.19.203.118/48339 dst dmz-1:64.186.234.194/62524 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48339 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 62524 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 64.186.234.194 serverIP: 194.19.203.118
Explain this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43355, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "146.124.60.186", "serverIP": "68.54.201.221" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:146.124.60.186/43355 dst dmz-1:68.54.201.221/3306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43355 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 146.124.60.186 serverIP: 68.54.201.221
Explain this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43355, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "91.209.241.60", "serverIP": "42.180.179.52" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:91.209.241.60/43355 dst dmz-1:42.180.179.52/3306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43355 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 91.209.241.60 serverIP: 42.180.179.52
Explain this syslog message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "137.7.73.182", "serverIP": "253.29.153.66" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:137.7.73.182/36690 dst dmz-1:253.29.153.66/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 137.7.73.182 serverIP: 253.29.153.66
Explain this syslog message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "9.54.21.230", "serverIP": "223.48.29.76" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:29: %ASA-4-106023: Deny tcp src outside:9.54.21.230/36690 dst dmz-1:223.48.29.76/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 9.54.21.230 serverIP: 223.48.29.76
Explain this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11421, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "198.110.243.238", "serverIP": "136.241.184.149" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:198.110.243.238/11421 dst dmz-1:136.241.184.149/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11421 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 198.110.243.238 serverIP: 136.241.184.149
Explain this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11421, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "220.145.145.230", "serverIP": "98.13.217.188" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:220.145.145.230/11421 dst dmz-1:98.13.217.188/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11421 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 220.145.145.230 serverIP: 98.13.217.188
Explain this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43355, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "148.255.121.126", "serverIP": "75.105.246.215" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:148.255.121.126/43355 dst dmz-1:75.105.246.215/3306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43355 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 148.255.121.126 serverIP: 75.105.246.215
Explain this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43355, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "129.110.137.34", "serverIP": "216.156.86.108" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:12: %ASA-4-106023: Deny tcp src outside:129.110.137.34/43355 dst dmz-1:216.156.86.108/3306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43355 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 129.110.137.34 serverIP: 216.156.86.108
Explain this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11421, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "141.233.4.116", "serverIP": "192.154.60.103" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:141.233.4.116/11421 dst dmz-1:192.154.60.103/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11421 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 141.233.4.116 serverIP: 192.154.60.103
Explain this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11421, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "129.247.150.15", "serverIP": "135.47.197.206" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:31: %ASA-4-106023: Deny tcp src outside:129.247.150.15/11421 dst dmz-1:135.47.197.206/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11421 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 129.247.150.15 serverIP: 135.47.197.206
Explain this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28366, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "85.58.74.54", "serverIP": "16.39.123.145" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:85.58.74.54/28366 dst dmz-1:16.39.123.145/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28366 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 85.58.74.54 serverIP: 16.39.123.145
Explain this syslog message