input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 33.237.189.48 serverIP: 120.156.197.70
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "157.156.187.145", "serverIP": "239.215.230.135" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 157.156.187.145 serverIP: 239.215.230.135
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.32.125.84", "serverIP": "5.224.191.230" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.32.125.84 serverIP: 5.224.191.230
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "79.206.223.222", "serverIP": "40.219.242.54" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 79.206.223.222 serverIP: 40.219.242.54
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "120.63.59.245", "serverIP": "113.201.178.64" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 120.63.59.245 serverIP: 113.201.178.64
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.39.124.101", "serverIP": "126.243.23.151" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.39.124.101 serverIP: 126.243.23.151
Explain this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27282, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59358, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "220.45.20.162", "serverIP": "164.32.81.14" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27282 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59358 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 220.45.20.162 serverIP: 164.32.81.14
Explain this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27282, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59358, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "31.150.43.131", "serverIP": "202.168.61.24" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27282 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59358 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 31.150.43.131 serverIP: 202.168.61.24
Explain this syslog message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "40.168.134.69", "serverIP": "207.121.125.140" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 40.168.134.69 serverIP: 207.121.125.140
Explain this syslog message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "24.62.158.243", "serverIP": "73.253.36.193" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 24.62.158.243 serverIP: 73.253.36.193
Explain this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27282, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59358, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "138.254.73.129", "serverIP": "125.39.94.101" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27282 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59358 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 138.254.73.129 serverIP: 125.39.94.101
Explain this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27282, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59358, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "201.59.18.231", "serverIP": "132.96.31.223" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27282 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59358 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 201.59.18.231 serverIP: 132.96.31.223
Explain this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 25458, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "58.78.198.66", "serverIP": "118.35.24.212" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 25458 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 58.78.198.66 serverIP: 118.35.24.212
Explain this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 25458, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "252.213.61.213", "serverIP": "214.41.102.14" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 25458 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 252.213.61.213 serverIP: 214.41.102.14
Explain this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 25458, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "221.72.195.28", "serverIP": "246.19.231.78" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 25458 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 221.72.195.28 serverIP: 246.19.231.78
Explain this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 25458, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "206.13.190.132", "serverIP": "69.168.158.177" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 25458 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 206.13.190.132 serverIP: 69.168.158.177
Explain this syslog message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48339, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 64072, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "16.118.203.61", "serverIP": "192.31.188.117" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48339 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 64072 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 16.118.203.61 serverIP: 192.31.188.117
Explain this syslog message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 48339, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 64072, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "223.27.2.36", "serverIP": "252.40.56.231" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 48339 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 64072 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 223.27.2.36 serverIP: 252.40.56.231
Explain this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 11364, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43068, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "210.69.104.7", "serverIP": "32.180.206.220" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 11364 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43068 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 210.69.104.7 serverIP: 32.180.206.220
Explain this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 11364, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43068, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "10.41.167.92", "serverIP": "213.22.100.130" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 11364 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43068 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 10.41.167.92 serverIP: 213.22.100.130
Explain this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 11364, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43068, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.163.22.123", "serverIP": "99.60.4.227" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 11364 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43068 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.163.22.123 serverIP: 99.60.4.227
Explain this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 11364, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43068, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "254.54.48.205", "serverIP": "41.112.190.184" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 11364 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43068 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 254.54.48.205 serverIP: 41.112.190.184
Explain this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 50070, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50859, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "52.92.192.132", "serverIP": "114.9.132.216" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 50070 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50859 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 52.92.192.132 serverIP: 114.9.132.216
Explain this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 50070, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50859, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "30.47.170.152", "serverIP": "2.120.191.249" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 50070 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50859 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 30.47.170.152 serverIP: 2.120.191.249
Explain this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 50070, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50859, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "235.106.222.236", "serverIP": "93.161.69.217" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 50070 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50859 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 235.106.222.236 serverIP: 93.161.69.217
Explain this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 50070, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50859, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "35.196.114.42", "serverIP": "214.100.134.251" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 50070 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50859 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 35.196.114.42 serverIP: 214.100.134.251
Explain this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 999, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.88.4.237", "serverIP": "121.2.84.128" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 999 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 240.88.4.237 serverIP: 121.2.84.128
Explain this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 999, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "42.38.175.174", "serverIP": "231.111.131.177" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 999 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 42.38.175.174 serverIP: 231.111.131.177
Explain this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 999, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "180.77.85.109", "serverIP": "241.167.172.130" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 999 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 180.77.85.109 serverIP: 241.167.172.130
Explain this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 999, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "94.3.146.188", "serverIP": "120.19.222.7" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 999 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 94.3.146.188 serverIP: 120.19.222.7
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10192, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.50.110.237", "serverIP": "67.19.238.235" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10192 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.50.110.237 serverIP: 67.19.238.235
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10192, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "128.157.115.60", "serverIP": "189.21.48.184" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10192 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 128.157.115.60 serverIP: 189.21.48.184
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32730, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.95.192.169", "serverIP": "36.73.188.248" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32730 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 167.95.192.169 serverIP: 36.73.188.248
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32730, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "66.125.172.163", "serverIP": "166.79.201.215" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message