input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7547,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47696,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "188.138.12.142",
"serverIP": "206.39.199.171"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:51:35: %ASA-4-106023: Deny tcp src outside:188.138.12.142/47696 dst dmz-1:206.39.199.171/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7547
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47696
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 188.138.12.142
serverIP: 206.39.199.171
|
Explain this syslog message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "117.115.36.69",
"serverIP": "168.123.89.100"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:117.115.36.69/37533 dst dmz-1:168.123.89.100/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 117.115.36.69
serverIP: 168.123.89.100
|
Explain this syslog message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37533,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "16.165.148.228",
"serverIP": "156.187.18.195"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 20:52:24: %ASA-4-106023: Deny tcp src outside:16.165.148.228/37533 dst dmz-1:156.187.18.195/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37533
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 16.165.148.228
serverIP: 156.187.18.195
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.59.96.224",
"serverIP": "190.163.27.175"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:20.59.96.224/61953 dst dmz-1:190.163.27.175/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.59.96.224
serverIP: 190.163.27.175
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "78.166.0.27",
"serverIP": "54.39.159.93"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:78.166.0.27/61953 dst dmz-1:54.39.159.93/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 78.166.0.27
serverIP: 54.39.159.93
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43054,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46378,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "54.153.191.146",
"serverIP": "122.250.18.106"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:54.153.191.146/46378 dst dmz-1:122.250.18.106/43054 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43054
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46378
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 54.153.191.146
serverIP: 122.250.18.106
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43054,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46378,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "164.230.175.129",
"serverIP": "164.43.134.166"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:00: %ASA-4-106023: Deny tcp src outside:164.230.175.129/46378 dst dmz-1:164.43.134.166/43054 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43054
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46378
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 164.230.175.129
serverIP: 164.43.134.166
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.98.132.185",
"serverIP": "140.85.145.116"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:38.98.132.185/61953 dst dmz-1:140.85.145.116/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 38.98.132.185
serverIP: 140.85.145.116
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "26.174.241.73",
"serverIP": "169.45.138.59"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:09: %ASA-4-106023: Deny tcp src outside:26.174.241.73/61953 dst dmz-1:169.45.138.59/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 26.174.241.73
serverIP: 169.45.138.59
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56686,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "236.72.248.118",
"serverIP": "108.220.244.248"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:236.72.248.118/56686 dst dmz-1:108.220.244.248/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56686
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 236.72.248.118
serverIP: 108.220.244.248
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56686,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "39.172.233.222",
"serverIP": "61.185.214.33"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:23: %ASA-4-106023: Deny tcp src outside:39.172.233.222/56686 dst dmz-1:61.185.214.33/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56686
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 39.172.233.222
serverIP: 61.185.214.33
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5110,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52655,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "173.233.188.207",
"serverIP": "3.3.122.117"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:173.233.188.207/52655 dst dmz-1:3.3.122.117/5110 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5110
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52655
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 173.233.188.207
serverIP: 3.3.122.117
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5110,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52655,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "192.254.103.208",
"serverIP": "88.206.254.39"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:41: %ASA-4-106023: Deny tcp src outside:192.254.103.208/52655 dst dmz-1:88.206.254.39/5110 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5110
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52655
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 192.254.103.208
serverIP: 88.206.254.39
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8639,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "197.218.147.73",
"serverIP": "165.210.75.128"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:197.218.147.73/48268 dst dmz-1:165.210.75.128/8639 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8639
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 197.218.147.73
serverIP: 165.210.75.128
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8639,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "148.183.49.47",
"serverIP": "129.244.45.178"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:48: %ASA-4-106023: Deny tcp src outside:148.183.49.47/48268 dst dmz-1:129.244.45.178/8639 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8639
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 148.183.49.47
serverIP: 129.244.45.178
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "74.135.203.245",
"serverIP": "55.137.251.69"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:74.135.203.245/61953 dst dmz-1:55.137.251.69/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 74.135.203.245
serverIP: 55.137.251.69
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "224.217.175.102",
"serverIP": "248.227.137.215"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:224.217.175.102/61953 dst dmz-1:248.227.137.215/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 224.217.175.102
serverIP: 248.227.137.215
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "216.67.234.174",
"serverIP": "76.153.77.165"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:216.67.234.174/35258 dst dmz-1:76.153.77.165/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 216.67.234.174
serverIP: 76.153.77.165
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.194.199.132",
"serverIP": "79.0.175.186"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:47: %ASA-4-106023: Deny udp src outside:67.194.199.132/35258 dst dmz-1:79.0.175.186/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 67.194.199.132
serverIP: 79.0.175.186
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37441,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "214.87.72.246",
"serverIP": "48.226.216.182"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:214.87.72.246/37441 dst dmz-1:48.226.216.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37441
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 214.87.72.246
serverIP: 48.226.216.182
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37441,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.58.153.141",
"serverIP": "246.135.37.135"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:141.58.153.141/37441 dst dmz-1:246.135.37.135/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37441
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.58.153.141
serverIP: 246.135.37.135
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "115.59.191.125",
"serverIP": "205.3.108.38"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:115.59.191.125/11294 dst dmz-1:205.3.108.38/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 115.59.191.125
serverIP: 205.3.108.38
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.15.132.59",
"serverIP": "44.231.154.182"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:50: %ASA-4-106023: Deny tcp src outside:32.15.132.59/11294 dst dmz-1:44.231.154.182/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 32.15.132.59
serverIP: 44.231.154.182
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "183.139.13.187",
"serverIP": "215.57.219.107"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:183.139.13.187/46347 dst dmz-1:215.57.219.107/37088 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 183.139.13.187
serverIP: 215.57.219.107
|
Explain this syslog message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "217.42.250.98",
"serverIP": "238.104.247.37"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:01:52: %ASA-4-106023: Deny tcp src outside:217.42.250.98/46347 dst dmz-1:238.104.247.37/37088 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 217.42.250.98
serverIP: 238.104.247.37
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "203.225.165.175",
"serverIP": "9.39.26.67"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:203.225.165.175/61953 dst dmz-1:9.39.26.67/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 203.225.165.175
serverIP: 9.39.26.67
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8880,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "136.220.55.129",
"serverIP": "66.122.22.229"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:22: %ASA-4-106023: Deny tcp src outside:136.220.55.129/61953 dst dmz-1:66.122.22.229/8880 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8880
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 136.220.55.129
serverIP: 66.122.22.229
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36099,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46314,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "126.59.248.70",
"serverIP": "189.218.104.49"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:126.59.248.70/46314 dst dmz-1:189.218.104.49/36099 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36099
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46314
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 126.59.248.70
serverIP: 189.218.104.49
|
Explain this syslog message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36099,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46314,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "149.242.177.133",
"serverIP": "240.74.22.88"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:02:44: %ASA-4-106023: Deny tcp src outside:149.242.177.133/46314 dst dmz-1:240.74.22.88/36099 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36099
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46314
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 149.242.177.133
serverIP: 240.74.22.88
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "30.174.208.14",
"serverIP": "34.127.183.206"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:30.174.208.14/15386 dst dmz-1:34.127.183.206/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15386
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 30.174.208.14
serverIP: 34.127.183.206
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.24.200.11",
"serverIP": "123.200.87.176"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:123.24.200.11/15386 dst dmz-1:123.200.87.176/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15386
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.24.200.11
serverIP: 123.200.87.176
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57581,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.37.209.31",
"serverIP": "86.17.238.202"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:226.37.209.31/57581 dst dmz-1:86.17.238.202/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57581
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.37.209.31
serverIP: 86.17.238.202
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57581,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "172.139.153.146",
"serverIP": "64.192.192.252"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:14: %ASA-4-106023: Deny tcp src outside:172.139.153.146/57581 dst dmz-1:64.192.192.252/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57581
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 172.139.153.146
serverIP: 64.192.192.252
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57581,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "43.47.32.143",
"serverIP": "150.10.118.241"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.