input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 33.237.189.48
serverIP: 120.156.197.70
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.156.187.145",
"serverIP": "239.215.230.135"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:157.156.187.145/9090 dst dmz-1:239.215.230.135/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 157.156.187.145
serverIP: 239.215.230.135
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.32.125.84",
"serverIP": "5.224.191.230"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.32.125.84/9090 dst dmz-1:5.224.191.230/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.32.125.84
serverIP: 5.224.191.230
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.206.223.222",
"serverIP": "40.219.242.54"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:79.206.223.222/9090 dst dmz-1:40.219.242.54/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.206.223.222
serverIP: 40.219.242.54
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "120.63.59.245",
"serverIP": "113.201.178.64"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:120.63.59.245/9090 dst dmz-1:113.201.178.64/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 120.63.59.245
serverIP: 113.201.178.64
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.39.124.101",
"serverIP": "126.243.23.151"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:240.39.124.101/9090 dst dmz-1:126.243.23.151/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.39.124.101
serverIP: 126.243.23.151
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27282,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59358,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "220.45.20.162",
"serverIP": "164.32.81.14"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:164.32.81.14/27282 dst dmz-1:220.45.20.162/59358 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27282
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59358
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 220.45.20.162
serverIP: 164.32.81.14
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27282,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59358,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "31.150.43.131",
"serverIP": "202.168.61.24"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:202.168.61.24/27282 dst dmz-1:31.150.43.131/59358 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27282
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59358
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 31.150.43.131
serverIP: 202.168.61.24
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "40.168.134.69",
"serverIP": "207.121.125.140"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:40.168.134.69/36690 dst dmz-1:207.121.125.140/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 40.168.134.69
serverIP: 207.121.125.140
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.62.158.243",
"serverIP": "73.253.36.193"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:32: %ASA-4-106023: Deny tcp src outside:24.62.158.243/36690 dst dmz-1:73.253.36.193/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 24.62.158.243
serverIP: 73.253.36.193
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27282,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59358,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "138.254.73.129",
"serverIP": "125.39.94.101"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:125.39.94.101/27282 dst dmz-1:138.254.73.129/59358 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27282
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59358
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 138.254.73.129
serverIP: 125.39.94.101
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27282,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59358,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "201.59.18.231",
"serverIP": "132.96.31.223"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:27: %ASA-4-106023: Deny tcp src outside:132.96.31.223/27282 dst dmz-1:201.59.18.231/59358 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27282
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59358
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 201.59.18.231
serverIP: 132.96.31.223
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 25458,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "58.78.198.66",
"serverIP": "118.35.24.212"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:58.78.198.66/25458 dst dmz-1:118.35.24.212/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 25458
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 58.78.198.66
serverIP: 118.35.24.212
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 25458,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "252.213.61.213",
"serverIP": "214.41.102.14"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:252.213.61.213/25458 dst dmz-1:214.41.102.14/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 25458
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 252.213.61.213
serverIP: 214.41.102.14
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 25458,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.72.195.28",
"serverIP": "246.19.231.78"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:221.72.195.28/25458 dst dmz-1:246.19.231.78/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 25458
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.72.195.28
serverIP: 246.19.231.78
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 25458,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "206.13.190.132",
"serverIP": "69.168.158.177"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:56: %ASA-4-106023: Deny tcp src outside:206.13.190.132/25458 dst dmz-1:69.168.158.177/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 25458
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 206.13.190.132
serverIP: 69.168.158.177
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48339,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 64072,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "16.118.203.61",
"serverIP": "192.31.188.117"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:192.31.188.117/48339 dst dmz-1:16.118.203.61/64072 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48339
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 64072
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 16.118.203.61
serverIP: 192.31.188.117
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 48339,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 64072,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "223.27.2.36",
"serverIP": "252.40.56.231"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:11: %ASA-4-106023: Deny tcp src outside:252.40.56.231/48339 dst dmz-1:223.27.2.36/64072 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 48339
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 64072
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 223.27.2.36
serverIP: 252.40.56.231
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11364,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43068,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "210.69.104.7",
"serverIP": "32.180.206.220"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:210.69.104.7/43068 dst dmz-1:32.180.206.220/11364 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11364
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43068
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 210.69.104.7
serverIP: 32.180.206.220
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11364,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43068,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "10.41.167.92",
"serverIP": "213.22.100.130"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:10.41.167.92/43068 dst dmz-1:213.22.100.130/11364 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11364
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43068
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 10.41.167.92
serverIP: 213.22.100.130
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11364,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43068,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.163.22.123",
"serverIP": "99.60.4.227"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:174.163.22.123/43068 dst dmz-1:99.60.4.227/11364 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11364
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43068
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.163.22.123
serverIP: 99.60.4.227
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11364,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43068,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "254.54.48.205",
"serverIP": "41.112.190.184"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:19: %ASA-4-106023: Deny tcp src outside:254.54.48.205/43068 dst dmz-1:41.112.190.184/11364 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11364
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43068
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 254.54.48.205
serverIP: 41.112.190.184
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 50070,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50859,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "52.92.192.132",
"serverIP": "114.9.132.216"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:52.92.192.132/50859 dst dmz-1:114.9.132.216/50070 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 50070
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50859
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 52.92.192.132
serverIP: 114.9.132.216
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 50070,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50859,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "30.47.170.152",
"serverIP": "2.120.191.249"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:30.47.170.152/50859 dst dmz-1:2.120.191.249/50070 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 50070
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50859
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 30.47.170.152
serverIP: 2.120.191.249
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 50070,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50859,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "235.106.222.236",
"serverIP": "93.161.69.217"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:235.106.222.236/50859 dst dmz-1:93.161.69.217/50070 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 50070
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50859
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 235.106.222.236
serverIP: 93.161.69.217
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 50070,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50859,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.196.114.42",
"serverIP": "214.100.134.251"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:14: %ASA-4-106023: Deny tcp src outside:35.196.114.42/50859 dst dmz-1:214.100.134.251/50070 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 50070
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50859
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 35.196.114.42
serverIP: 214.100.134.251
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 999,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.88.4.237",
"serverIP": "121.2.84.128"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:240.88.4.237/49258 dst dmz-1:121.2.84.128/999 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 999
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 240.88.4.237
serverIP: 121.2.84.128
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 999,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.38.175.174",
"serverIP": "231.111.131.177"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:42.38.175.174/49258 dst dmz-1:231.111.131.177/999 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 999
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 42.38.175.174
serverIP: 231.111.131.177
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 999,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "180.77.85.109",
"serverIP": "241.167.172.130"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:180.77.85.109/49258 dst dmz-1:241.167.172.130/999 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 999
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 180.77.85.109
serverIP: 241.167.172.130
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 999,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "94.3.146.188",
"serverIP": "120.19.222.7"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:24: %ASA-4-106023: Deny udp src outside:94.3.146.188/49258 dst dmz-1:120.19.222.7/999 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 999
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 94.3.146.188
serverIP: 120.19.222.7
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10192,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.50.110.237",
"serverIP": "67.19.238.235"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.50.110.237/10192 dst dmz-1:67.19.238.235/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10192
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.50.110.237
serverIP: 67.19.238.235
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10192,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "128.157.115.60",
"serverIP": "189.21.48.184"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:128.157.115.60/10192 dst dmz-1:189.21.48.184/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10192
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 128.157.115.60
serverIP: 189.21.48.184
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32730,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.95.192.169",
"serverIP": "36.73.188.248"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:167.95.192.169/32730 dst dmz-1:36.73.188.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32730
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 167.95.192.169
serverIP: 36.73.188.248
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32730,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "66.125.172.163",
"serverIP": "166.79.201.215"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.