input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57581 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 43.47.32.143 serverIP: 150.10.118.241
Explain this syslog message
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57581, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "37.140.228.186", "serverIP": "188.33.214.207" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57581 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 37.140.228.186 serverIP: 188.33.214.207
Explain this syslog message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44818, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47387, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "28.16.131.81", "serverIP": "140.246.204.207" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44818 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47387 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 28.16.131.81 serverIP: 140.246.204.207
Explain this syslog message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44818, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47387, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "220.236.122.164", "serverIP": "122.52.228.118" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44818 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47387 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 220.236.122.164 serverIP: 122.52.228.118
Explain this syslog message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "157.207.210.239", "serverIP": "249.213.50.187" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 157.207.210.239 serverIP: 249.213.50.187
Explain this syslog message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35258, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "99.60.46.129", "serverIP": "157.119.201.169" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35258 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 99.60.46.129 serverIP: 157.119.201.169
Explain this syslog message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 23541, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "113.202.57.207", "serverIP": "0.32.46.41" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 23541 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 113.202.57.207 serverIP: 0.32.46.41
Explain this syslog message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 23541, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "9.64.23.61", "serverIP": "111.215.246.235" }
Create a JSON artifact from the message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 23541 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 9.64.23.61 serverIP: 111.215.246.235
Explain this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 65191, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "76.103.57.172", "serverIP": "124.222.14.140" }
Create a JSON artifact from the message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 65191 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 76.103.57.172 serverIP: 124.222.14.140
Explain this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 65191, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "61.239.37.101", "serverIP": "225.54.174.73" }
Create a JSON artifact from the message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 65191 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 61.239.37.101 serverIP: 225.54.174.73
Explain this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 65191, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "39.235.168.217", "serverIP": "124.109.152.60" }
Create a JSON artifact from the message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 65191 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 39.235.168.217 serverIP: 124.109.152.60
Explain this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 65191, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "48.247.148.83", "serverIP": "29.30.84.190" }
Create a JSON artifact from the message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 65191 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 48.247.148.83 serverIP: 29.30.84.190
Explain this syslog message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 211, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54400, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "195.14.70.123", "serverIP": "57.165.215.208" }
Create a JSON artifact from the message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 211 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54400 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 195.14.70.123 serverIP: 57.165.215.208
Explain this syslog message
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 33351, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40210, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "244.70.247.139", "serverIP": "67.176.4.60" }
Create a JSON artifact from the message
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 33351 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40210 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 244.70.247.139 serverIP: 67.176.4.60
Explain this syslog message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 211, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54400, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "104.135.219.252", "serverIP": "141.243.189.133" }
Create a JSON artifact from the message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 211 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54400 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 104.135.219.252 serverIP: 141.243.189.133
Explain this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7607, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49803, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "232.234.125.50", "serverIP": "47.15.30.22" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7607 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49803 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 232.234.125.50 serverIP: 47.15.30.22
Explain this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7607, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49803, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "124.178.81.31", "serverIP": "157.218.169.185" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7607 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49803 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 124.178.81.31 serverIP: 157.218.169.185
Explain this syslog message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9724, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41500, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "156.75.169.128", "serverIP": "235.126.75.30" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9724 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41500 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 156.75.169.128 serverIP: 235.126.75.30
Explain this syslog message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9724, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41500, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "189.87.62.164", "serverIP": "184.214.5.143" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9724 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41500 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 189.87.62.164 serverIP: 184.214.5.143
Explain this syslog message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43158, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52526, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "17.120.94.208", "serverIP": "7.120.160.174" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43158 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52526 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 17.120.94.208 serverIP: 7.120.160.174
Explain this syslog message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43158, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52526, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "89.199.115.160", "serverIP": "202.46.156.167" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43158 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52526 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 89.199.115.160 serverIP: 202.46.156.167
Explain this syslog message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 14480, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52751, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "192.206.25.174", "serverIP": "5.242.8.174" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 14480 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52751 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 192.206.25.174 serverIP: 5.242.8.174
Explain this syslog message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 14480, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52751, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "100.126.101.26", "serverIP": "186.231.57.45" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 14480 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52751 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 100.126.101.26 serverIP: 186.231.57.45
Explain this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7607, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49803, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "1.43.96.30", "serverIP": "255.228.187.130" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7607 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49803 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 1.43.96.30 serverIP: 255.228.187.130
Explain this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7607, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49803, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "165.238.168.229", "serverIP": "30.168.60.18" }
Create a JSON artifact from the message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7607 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49803 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 165.238.168.229 serverIP: 30.168.60.18
Explain this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10144, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "68.84.223.238", "serverIP": "80.9.85.146" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10144 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 68.84.223.238 serverIP: 80.9.85.146
Explain this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10144, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "214.234.201.194", "serverIP": "202.166.144.152" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10144 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 214.234.201.194 serverIP: 202.166.144.152
Explain this syslog message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41970, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "188.14.144.176", "serverIP": "8.238.153.77" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41970 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 188.14.144.176 serverIP: 8.238.153.77
Explain this syslog message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8083, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41970, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "243.224.209.218", "serverIP": "78.157.42.23" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8083 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41970 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 243.224.209.218 serverIP: 78.157.42.23
Explain this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10144, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "228.125.110.131", "serverIP": "226.159.9.180" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10144 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 228.125.110.131 serverIP: 226.159.9.180
Explain this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 10144, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "42.251.11.150", "serverIP": "76.47.151.253" }
Create a JSON artifact from the message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 10144 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 42.251.11.150 serverIP: 76.47.151.253
Explain this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28463, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.242.74.77", "serverIP": "234.252.248.170" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28463 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.242.74.77 serverIP: 234.252.248.170
Explain this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28463, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "66.153.219.201", "serverIP": "169.70.167.59" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28463 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 66.153.219.201 serverIP: 169.70.167.59
Explain this syslog message
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43156, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49308, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "123.225.202.209", "serverIP": "92.232.218.135" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message