input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7547, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47696, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "188.138.12.142", "serverIP": "206.39.199.171" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7547 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47696 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 188.138.12.142 serverIP: 206.39.199.171
Explain this syslog message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "117.115.36.69", "serverIP": "168.123.89.100" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 117.115.36.69 serverIP: 168.123.89.100
Explain this syslog message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37533, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "16.165.148.228", "serverIP": "156.187.18.195" }
Create a JSON artifact from the message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37533 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 16.165.148.228 serverIP: 156.187.18.195
Explain this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.59.96.224", "serverIP": "190.163.27.175" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.59.96.224 serverIP: 190.163.27.175
Explain this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "78.166.0.27", "serverIP": "54.39.159.93" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 78.166.0.27 serverIP: 54.39.159.93
Explain this syslog message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43054, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46378, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "54.153.191.146", "serverIP": "122.250.18.106" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43054 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46378 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 54.153.191.146 serverIP: 122.250.18.106
Explain this syslog message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43054, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46378, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "164.230.175.129", "serverIP": "164.43.134.166" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43054 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46378 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 164.230.175.129 serverIP: 164.43.134.166
Explain this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "38.98.132.185", "serverIP": "140.85.145.116" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 38.98.132.185 serverIP: 140.85.145.116
Explain this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "26.174.241.73", "serverIP": "169.45.138.59" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 26.174.241.73 serverIP: 169.45.138.59
Explain this syslog message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56686, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "236.72.248.118", "serverIP": "108.220.244.248" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56686 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 236.72.248.118 serverIP: 108.220.244.248
Explain this syslog message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56686, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "39.172.233.222", "serverIP": "61.185.214.33" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56686 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 39.172.233.222 serverIP: 61.185.214.33
Explain this syslog message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5110, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52655, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "173.233.188.207", "serverIP": "3.3.122.117" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5110 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52655 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 173.233.188.207 serverIP: 3.3.122.117
Explain this syslog message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5110, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52655, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "192.254.103.208", "serverIP": "88.206.254.39" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5110 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52655 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 192.254.103.208 serverIP: 88.206.254.39
Explain this syslog message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8639, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48268, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "197.218.147.73", "serverIP": "165.210.75.128" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8639 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48268 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 197.218.147.73 serverIP: 165.210.75.128
Explain this syslog message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8639, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48268, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "148.183.49.47", "serverIP": "129.244.45.178" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8639 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48268 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 148.183.49.47 serverIP: 129.244.45.178
Explain this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "74.135.203.245", "serverIP": "55.137.251.69" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 74.135.203.245 serverIP: 55.137.251.69
Explain this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "224.217.175.102", "serverIP": "248.227.137.215" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 224.217.175.102 serverIP: 248.227.137.215
Explain this syslog message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "216.67.234.174", "serverIP": "76.153.77.165" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 216.67.234.174 serverIP: 76.153.77.165
Explain this syslog message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.194.199.132", "serverIP": "79.0.175.186" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 67.194.199.132 serverIP: 79.0.175.186
Explain this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37441, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "214.87.72.246", "serverIP": "48.226.216.182" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37441 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 214.87.72.246 serverIP: 48.226.216.182
Explain this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37441, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "141.58.153.141", "serverIP": "246.135.37.135" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37441 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 141.58.153.141 serverIP: 246.135.37.135
Explain this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "115.59.191.125", "serverIP": "205.3.108.38" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 115.59.191.125 serverIP: 205.3.108.38
Explain this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "32.15.132.59", "serverIP": "44.231.154.182" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 32.15.132.59 serverIP: 44.231.154.182
Explain this syslog message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 37088, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "183.139.13.187", "serverIP": "215.57.219.107" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 37088 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 183.139.13.187 serverIP: 215.57.219.107
Explain this syslog message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 37088, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "217.42.250.98", "serverIP": "238.104.247.37" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 37088 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 217.42.250.98 serverIP: 238.104.247.37
Explain this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "203.225.165.175", "serverIP": "9.39.26.67" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 203.225.165.175 serverIP: 9.39.26.67
Explain this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8880, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "136.220.55.129", "serverIP": "66.122.22.229" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8880 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 136.220.55.129 serverIP: 66.122.22.229
Explain this syslog message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36099, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46314, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "126.59.248.70", "serverIP": "189.218.104.49" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36099 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46314 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 126.59.248.70 serverIP: 189.218.104.49
Explain this syslog message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36099, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46314, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "149.242.177.133", "serverIP": "240.74.22.88" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36099 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46314 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 149.242.177.133 serverIP: 240.74.22.88
Explain this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "30.174.208.14", "serverIP": "34.127.183.206" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15386 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 30.174.208.14 serverIP: 34.127.183.206
Explain this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "123.24.200.11", "serverIP": "123.200.87.176" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15386 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 123.24.200.11 serverIP: 123.200.87.176
Explain this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57581, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.37.209.31", "serverIP": "86.17.238.202" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57581 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.37.209.31 serverIP: 86.17.238.202
Explain this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57581, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "172.139.153.146", "serverIP": "64.192.192.252" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57581 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 172.139.153.146 serverIP: 64.192.192.252
Explain this syslog message
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57581, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "43.47.32.143", "serverIP": "150.10.118.241" }
Create a JSON artifact from the message