input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32730
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 66.125.172.163
serverIP: 166.79.201.215
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.101.164.83",
"serverIP": "58.114.217.195"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.101.164.83
serverIP: 58.114.217.195
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "250.110.167.151",
"serverIP": "226.203.17.200"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 250.110.167.151
serverIP: 226.203.17.200
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12286,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.17.220.95",
"serverIP": "77.37.167.244"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12286
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.17.220.95
serverIP: 77.37.167.244
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12286,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "18.79.17.86",
"serverIP": "98.69.141.99"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12286
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 18.79.17.86
serverIP: 98.69.141.99
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10192,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "23.100.82.82",
"serverIP": "52.204.78.56"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10192
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 23.100.82.82
serverIP: 52.204.78.56
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10192,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.150.234.237",
"serverIP": "181.136.185.9"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10192
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.150.234.237
serverIP: 181.136.185.9
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12311,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "69.12.45.215",
"serverIP": "106.238.111.80"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12311
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 69.12.45.215
serverIP: 106.238.111.80
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12311,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.42.224.106",
"serverIP": "50.0.13.156"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12311
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 67.42.224.106
serverIP: 50.0.13.156
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32730,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "191.67.186.4",
"serverIP": "67.239.54.51"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32730
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 191.67.186.4
serverIP: 67.239.54.51
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32730,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.93.93.151",
"serverIP": "117.15.236.43"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32730
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.93.93.151
serverIP: 117.15.236.43
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 29434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60112,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "97.36.215.200",
"serverIP": "224.135.163.169"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 29434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60112
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 97.36.215.200
serverIP: 224.135.163.169
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 29434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60112,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "92.27.198.38",
"serverIP": "224.181.250.171"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 29434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60112
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 92.27.198.38
serverIP: 224.181.250.171
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3390,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47076,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.236.186.47",
"serverIP": "126.135.209.40"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3390
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47076
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.236.186.47
serverIP: 126.135.209.40
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3390,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47076,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "126.51.187.137",
"serverIP": "13.207.150.202"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3390
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47076
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 126.51.187.137
serverIP: 13.207.150.202
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "69.163.233.198",
"serverIP": "213.175.135.248"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 69.163.233.198
serverIP: 213.175.135.248
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "189.89.9.117",
"serverIP": "20.146.244.57"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 189.89.9.117
serverIP: 20.146.244.57
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10230,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "169.174.214.177",
"serverIP": "206.41.67.182"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10230
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 169.174.214.177
serverIP: 206.41.67.182
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10230,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "160.201.236.222",
"serverIP": "206.75.122.138"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10230
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 160.201.236.222
serverIP: 206.75.122.138
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10230,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.53.21.97",
"serverIP": "123.235.82.130"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10230
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.53.21.97
serverIP: 123.235.82.130
|
Explain this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 79,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10230,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "29.204.250.181",
"serverIP": "190.202.91.204"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 79
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10230
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 29.204.250.181
serverIP: 190.202.91.204
|
Explain this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2223,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 2775,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "41.139.195.169",
"serverIP": "63.60.111.148"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2223
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 2775
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 41.139.195.169
serverIP: 63.60.111.148
|
Explain this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2223,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 2775,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "211.34.61.209",
"serverIP": "167.193.145.141"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2223
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 2775
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 211.34.61.209
serverIP: 167.193.145.141
|
Explain this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2223,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 2775,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "178.146.32.199",
"serverIP": "78.5.184.173"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2223
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 2775
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 178.146.32.199
serverIP: 78.5.184.173
|
Explain this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2223,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 2775,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "193.230.247.21",
"serverIP": "214.136.29.119"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2223
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 2775
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 193.230.247.21
serverIP: 214.136.29.119
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7547,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47696,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "120.244.220.32",
"serverIP": "82.144.153.169"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7547
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47696
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 120.244.220.32
serverIP: 82.144.153.169
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7547,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47696,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "223.75.234.69",
"serverIP": "253.112.142.40"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7547
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47696
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 223.75.234.69
serverIP: 253.112.142.40
|
Explain this syslog message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1212,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43586,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.82.105.174",
"serverIP": "3.136.40.120"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1212
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43586
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 67.82.105.174
serverIP: 3.136.40.120
|
Explain this syslog message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1212,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43586,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "19.60.240.184",
"serverIP": "47.61.248.29"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1212
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43586
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 19.60.240.184
serverIP: 47.61.248.29
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8500,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "144.156.204.33",
"serverIP": "72.161.187.71"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8500
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 144.156.204.33
serverIP: 72.161.187.71
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8500,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "185.43.68.121",
"serverIP": "172.215.1.247"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8500
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 185.43.68.121
serverIP: 172.215.1.247
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4747,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.85.162.124",
"serverIP": "27.33.28.75"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4747
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51386
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.85.162.124
serverIP: 27.33.28.75
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4747,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "114.252.253.18",
"serverIP": "63.119.255.207"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4747
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51386
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 114.252.253.18
serverIP: 63.119.255.207
|
Explain this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7547,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47696,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "7.185.68.90",
"serverIP": "250.133.250.137"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7547
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47696
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 7.185.68.90
serverIP: 250.133.250.137
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.