input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:66.125.172.163/32730 dst dmz-1:166.79.201.215/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32730 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 66.125.172.163 serverIP: 166.79.201.215
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.101.164.83", "serverIP": "58.114.217.195" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:226.101.164.83/32758 dst dmz-1:58.114.217.195/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.101.164.83 serverIP: 58.114.217.195
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "250.110.167.151", "serverIP": "226.203.17.200" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:250.110.167.151/32758 dst dmz-1:226.203.17.200/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 250.110.167.151 serverIP: 226.203.17.200
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12286, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.17.220.95", "serverIP": "77.37.167.244" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:200.17.220.95/12286 dst dmz-1:77.37.167.244/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12286 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.17.220.95 serverIP: 77.37.167.244
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12286, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "18.79.17.86", "serverIP": "98.69.141.99" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:18.79.17.86/12286 dst dmz-1:98.69.141.99/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12286 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 18.79.17.86 serverIP: 98.69.141.99
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10192, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "23.100.82.82", "serverIP": "52.204.78.56" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:23.100.82.82/10192 dst dmz-1:52.204.78.56/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10192 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 23.100.82.82 serverIP: 52.204.78.56
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10192, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "106.150.234.237", "serverIP": "181.136.185.9" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:106.150.234.237/10192 dst dmz-1:181.136.185.9/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10192 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 106.150.234.237 serverIP: 181.136.185.9
Explain this syslog message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12311, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "69.12.45.215", "serverIP": "106.238.111.80" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:69.12.45.215/12311 dst dmz-1:106.238.111.80/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12311 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 69.12.45.215 serverIP: 106.238.111.80
Explain this syslog message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12311, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.42.224.106", "serverIP": "50.0.13.156" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:46: %ASA-4-106023: Deny tcp src outside:67.42.224.106/12311 dst dmz-1:50.0.13.156/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12311 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 67.42.224.106 serverIP: 50.0.13.156
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32730, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "191.67.186.4", "serverIP": "67.239.54.51" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:191.67.186.4/32730 dst dmz-1:67.239.54.51/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32730 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 191.67.186.4 serverIP: 67.239.54.51
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32730, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.93.93.151", "serverIP": "117.15.236.43" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:20.93.93.151/32730 dst dmz-1:117.15.236.43/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32730 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.93.93.151 serverIP: 117.15.236.43
Explain this syslog message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 29434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60112, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "97.36.215.200", "serverIP": "224.135.163.169" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:97.36.215.200/60112 dst dmz-1:224.135.163.169/29434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 29434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60112 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 97.36.215.200 serverIP: 224.135.163.169
Explain this syslog message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 29434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60112, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "92.27.198.38", "serverIP": "224.181.250.171" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:32: %ASA-4-106023: Deny tcp src outside:92.27.198.38/60112 dst dmz-1:224.181.250.171/29434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 29434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60112 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 92.27.198.38 serverIP: 224.181.250.171
Explain this syslog message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3390, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47076, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.236.186.47", "serverIP": "126.135.209.40" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:240.236.186.47/47076 dst dmz-1:126.135.209.40/3390 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3390 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47076 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.236.186.47 serverIP: 126.135.209.40
Explain this syslog message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3390, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47076, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "126.51.187.137", "serverIP": "13.207.150.202" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:43: %ASA-4-106023: Deny tcp src outside:126.51.187.137/47076 dst dmz-1:13.207.150.202/3390 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3390 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47076 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 126.51.187.137 serverIP: 13.207.150.202
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "69.163.233.198", "serverIP": "213.175.135.248" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:69.163.233.198/32758 dst dmz-1:213.175.135.248/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 69.163.233.198 serverIP: 213.175.135.248
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "189.89.9.117", "serverIP": "20.146.244.57" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:189.89.9.117/32758 dst dmz-1:20.146.244.57/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 189.89.9.117 serverIP: 20.146.244.57
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10230, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "169.174.214.177", "serverIP": "206.41.67.182" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:169.174.214.177/10230 dst dmz-1:206.41.67.182/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10230 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 169.174.214.177 serverIP: 206.41.67.182
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10230, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "160.201.236.222", "serverIP": "206.75.122.138" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:160.201.236.222/10230 dst dmz-1:206.75.122.138/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10230 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 160.201.236.222 serverIP: 206.75.122.138
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10230, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "2.53.21.97", "serverIP": "123.235.82.130" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:2.53.21.97/10230 dst dmz-1:123.235.82.130/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10230 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 2.53.21.97 serverIP: 123.235.82.130
Explain this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 79, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10230, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "29.204.250.181", "serverIP": "190.202.91.204" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:53:47: %ASA-4-106023: Deny tcp src outside:29.204.250.181/10230 dst dmz-1:190.202.91.204/79 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 79 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10230 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 29.204.250.181 serverIP: 190.202.91.204
Explain this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2223, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 2775, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "41.139.195.169", "serverIP": "63.60.111.148" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:41.139.195.169/2775 dst dmz-1:63.60.111.148/2223 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2223 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 2775 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 41.139.195.169 serverIP: 63.60.111.148
Explain this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2223, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 2775, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "211.34.61.209", "serverIP": "167.193.145.141" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:211.34.61.209/2775 dst dmz-1:167.193.145.141/2223 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2223 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 2775 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 211.34.61.209 serverIP: 167.193.145.141
Explain this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2223, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 2775, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "178.146.32.199", "serverIP": "78.5.184.173" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:178.146.32.199/2775 dst dmz-1:78.5.184.173/2223 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2223 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 2775 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 178.146.32.199 serverIP: 78.5.184.173
Explain this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2223, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 2775, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "193.230.247.21", "serverIP": "214.136.29.119" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:54:44: %ASA-4-106023: Deny tcp src outside:193.230.247.21/2775 dst dmz-1:214.136.29.119/2223 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2223 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 2775 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 193.230.247.21 serverIP: 214.136.29.119
Explain this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7547, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47696, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "120.244.220.32", "serverIP": "82.144.153.169" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:120.244.220.32/47696 dst dmz-1:82.144.153.169/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7547 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47696 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 120.244.220.32 serverIP: 82.144.153.169
Explain this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7547, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47696, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "223.75.234.69", "serverIP": "253.112.142.40" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:223.75.234.69/47696 dst dmz-1:253.112.142.40/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7547 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47696 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 223.75.234.69 serverIP: 253.112.142.40
Explain this syslog message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1212, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43586, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.82.105.174", "serverIP": "3.136.40.120" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:67.82.105.174/43586 dst dmz-1:3.136.40.120/1212 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1212 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43586 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 67.82.105.174 serverIP: 3.136.40.120
Explain this syslog message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1212, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43586, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "19.60.240.184", "serverIP": "47.61.248.29" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:50:48: %ASA-4-106023: Deny tcp src outside:19.60.240.184/43586 dst dmz-1:47.61.248.29/1212 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1212 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43586 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 19.60.240.184 serverIP: 47.61.248.29
Explain this syslog message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8500, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "144.156.204.33", "serverIP": "72.161.187.71" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:144.156.204.33/61953 dst dmz-1:72.161.187.71/8500 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8500 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 144.156.204.33 serverIP: 72.161.187.71
Explain this syslog message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8500, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "185.43.68.121", "serverIP": "172.215.1.247" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:03: %ASA-4-106023: Deny tcp src outside:185.43.68.121/61953 dst dmz-1:172.215.1.247/8500 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8500 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 185.43.68.121 serverIP: 172.215.1.247
Explain this syslog message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4747, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.85.162.124", "serverIP": "27.33.28.75" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:200.85.162.124/51386 dst dmz-1:27.33.28.75/4747 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4747 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51386 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.85.162.124 serverIP: 27.33.28.75
Explain this syslog message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4747, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "114.252.253.18", "serverIP": "63.119.255.207" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:12: %ASA-4-106023: Deny tcp src outside:114.252.253.18/51386 dst dmz-1:63.119.255.207/4747 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4747 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51386 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 114.252.253.18 serverIP: 63.119.255.207
Explain this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7547, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47696, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "7.185.68.90", "serverIP": "250.133.250.137" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:7.185.68.90/47696 dst dmz-1:250.133.250.137/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7547 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47696 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 7.185.68.90 serverIP: 250.133.250.137
Explain this syslog message