input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:43.47.32.143/57581 dst dmz-1:150.10.118.241/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57581
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 43.47.32.143
serverIP: 150.10.118.241
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57581,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "37.140.228.186",
"serverIP": "188.33.214.207"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:17: %ASA-4-106023: Deny tcp src outside:37.140.228.186/57581 dst dmz-1:188.33.214.207/6514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57581
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 37.140.228.186
serverIP: 188.33.214.207
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44818,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47387,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "28.16.131.81",
"serverIP": "140.246.204.207"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:28.16.131.81/47387 dst dmz-1:140.246.204.207/44818 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44818
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47387
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 28.16.131.81
serverIP: 140.246.204.207
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44818,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47387,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "220.236.122.164",
"serverIP": "122.52.228.118"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:28: %ASA-4-106023: Deny tcp src outside:220.236.122.164/47387 dst dmz-1:122.52.228.118/44818 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44818
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47387
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 220.236.122.164
serverIP: 122.52.228.118
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.207.210.239",
"serverIP": "249.213.50.187"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:157.207.210.239/35258 dst dmz-1:249.213.50.187/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 157.207.210.239
serverIP: 249.213.50.187
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35258,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "99.60.46.129",
"serverIP": "157.119.201.169"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:42: %ASA-4-106023: Deny udp src outside:99.60.46.129/35258 dst dmz-1:157.119.201.169/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35258
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 99.60.46.129
serverIP: 157.119.201.169
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 23541,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "113.202.57.207",
"serverIP": "0.32.46.41"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:113.202.57.207/23541 dst dmz-1:0.32.46.41/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 23541
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 113.202.57.207
serverIP: 0.32.46.41
|
Explain this syslog message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 23541,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "9.64.23.61",
"serverIP": "111.215.246.235"
}
|
Create a JSON artifact from the message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 29 2022 20:03:52: %ASA-4-106023: Deny tcp src outside:9.64.23.61/23541 dst dmz-1:111.215.246.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 23541
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 9.64.23.61
serverIP: 111.215.246.235
|
Explain this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 65191,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.103.57.172",
"serverIP": "124.222.14.140"
}
|
Create a JSON artifact from the message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:76.103.57.172/65191 dst dmz-1:124.222.14.140/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 65191
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 76.103.57.172
serverIP: 124.222.14.140
|
Explain this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 65191,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "61.239.37.101",
"serverIP": "225.54.174.73"
}
|
Create a JSON artifact from the message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:61.239.37.101/65191 dst dmz-1:225.54.174.73/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 65191
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 61.239.37.101
serverIP: 225.54.174.73
|
Explain this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 65191,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "39.235.168.217",
"serverIP": "124.109.152.60"
}
|
Create a JSON artifact from the message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:39.235.168.217/65191 dst dmz-1:124.109.152.60/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 65191
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 39.235.168.217
serverIP: 124.109.152.60
|
Explain this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 65191,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "48.247.148.83",
"serverIP": "29.30.84.190"
}
|
Create a JSON artifact from the message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 06 2022 00:04:28: %ASA-4-106023: Deny udp src outside:48.247.148.83/65191 dst dmz-1:29.30.84.190/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 65191
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 48.247.148.83
serverIP: 29.30.84.190
|
Explain this syslog message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 211,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54400,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "195.14.70.123",
"serverIP": "57.165.215.208"
}
|
Create a JSON artifact from the message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:195.14.70.123/54400 dst dmz-1:57.165.215.208/211 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 211
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54400
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 195.14.70.123
serverIP: 57.165.215.208
|
Explain this syslog message
|
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 33351,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40210,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "244.70.247.139",
"serverIP": "67.176.4.60"
}
|
Create a JSON artifact from the message
|
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 02 2022 10:30:23: %ASA-4-106023: Deny tcp src outside:244.70.247.139/40210 dst dmz-1:67.176.4.60/33351 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 33351
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40210
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 244.70.247.139
serverIP: 67.176.4.60
|
Explain this syslog message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 211,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54400,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "104.135.219.252",
"serverIP": "141.243.189.133"
}
|
Create a JSON artifact from the message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 02 2022 10:31:10: %ASA-4-106023: Deny tcp src outside:104.135.219.252/54400 dst dmz-1:141.243.189.133/211 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 211
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54400
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 104.135.219.252
serverIP: 141.243.189.133
|
Explain this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7607,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49803,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "232.234.125.50",
"serverIP": "47.15.30.22"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:232.234.125.50/49803 dst dmz-1:47.15.30.22/7607 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7607
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49803
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 232.234.125.50
serverIP: 47.15.30.22
|
Explain this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7607,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49803,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "124.178.81.31",
"serverIP": "157.218.169.185"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:124.178.81.31/49803 dst dmz-1:157.218.169.185/7607 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7607
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49803
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 124.178.81.31
serverIP: 157.218.169.185
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9724,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41500,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "156.75.169.128",
"serverIP": "235.126.75.30"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:156.75.169.128/41500 dst dmz-1:235.126.75.30/9724 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9724
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41500
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 156.75.169.128
serverIP: 235.126.75.30
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9724,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41500,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "189.87.62.164",
"serverIP": "184.214.5.143"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:36: %ASA-4-106023: Deny tcp src outside:189.87.62.164/41500 dst dmz-1:184.214.5.143/9724 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9724
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41500
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 189.87.62.164
serverIP: 184.214.5.143
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43158,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52526,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "17.120.94.208",
"serverIP": "7.120.160.174"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:7.120.160.174/43158 dst dmz-1:17.120.94.208/52526 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43158
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52526
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 17.120.94.208
serverIP: 7.120.160.174
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43158,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52526,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "89.199.115.160",
"serverIP": "202.46.156.167"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:57: %ASA-4-106023: Deny tcp src outside:202.46.156.167/43158 dst dmz-1:89.199.115.160/52526 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43158
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52526
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 89.199.115.160
serverIP: 202.46.156.167
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 14480,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52751,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "192.206.25.174",
"serverIP": "5.242.8.174"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:192.206.25.174/52751 dst dmz-1:5.242.8.174/14480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 14480
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52751
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 192.206.25.174
serverIP: 5.242.8.174
|
Explain this syslog message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 14480,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52751,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "100.126.101.26",
"serverIP": "186.231.57.45"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:43:39: %ASA-4-106023: Deny tcp src outside:100.126.101.26/52751 dst dmz-1:186.231.57.45/14480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 14480
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52751
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 100.126.101.26
serverIP: 186.231.57.45
|
Explain this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7607,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49803,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "1.43.96.30",
"serverIP": "255.228.187.130"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:1.43.96.30/49803 dst dmz-1:255.228.187.130/7607 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7607
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49803
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 1.43.96.30
serverIP: 255.228.187.130
|
Explain this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7607,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49803,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "165.238.168.229",
"serverIP": "30.168.60.18"
}
|
Create a JSON artifact from the message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 01 2022 23:44:14: %ASA-4-106023: Deny tcp src outside:165.238.168.229/49803 dst dmz-1:30.168.60.18/7607 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7607
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49803
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 165.238.168.229
serverIP: 30.168.60.18
|
Explain this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10144,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "68.84.223.238",
"serverIP": "80.9.85.146"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:68.84.223.238/10144 dst dmz-1:80.9.85.146/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10144
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 68.84.223.238
serverIP: 80.9.85.146
|
Explain this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10144,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "214.234.201.194",
"serverIP": "202.166.144.152"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:214.234.201.194/10144 dst dmz-1:202.166.144.152/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10144
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 214.234.201.194
serverIP: 202.166.144.152
|
Explain this syslog message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41970,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "188.14.144.176",
"serverIP": "8.238.153.77"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:188.14.144.176/41970 dst dmz-1:8.238.153.77/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41970
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 188.14.144.176
serverIP: 8.238.153.77
|
Explain this syslog message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8083,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41970,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "243.224.209.218",
"serverIP": "78.157.42.23"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:08:53: %ASA-4-106023: Deny tcp src outside:243.224.209.218/41970 dst dmz-1:78.157.42.23/8083 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8083
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41970
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 243.224.209.218
serverIP: 78.157.42.23
|
Explain this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10144,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.125.110.131",
"serverIP": "226.159.9.180"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:228.125.110.131/10144 dst dmz-1:226.159.9.180/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10144
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.125.110.131
serverIP: 226.159.9.180
|
Explain this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 10144,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.251.11.150",
"serverIP": "76.47.151.253"
}
|
Create a JSON artifact from the message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jan 02 2023 04:09:00: %ASA-4-106023: Deny tcp src outside:42.251.11.150/10144 dst dmz-1:76.47.151.253/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 10144
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 42.251.11.150
serverIP: 76.47.151.253
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28463,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.242.74.77",
"serverIP": "234.252.248.170"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:226.242.74.77/28463 dst dmz-1:234.252.248.170/902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28463
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.242.74.77
serverIP: 234.252.248.170
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28463,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "66.153.219.201",
"serverIP": "169.70.167.59"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:66.153.219.201/28463 dst dmz-1:169.70.167.59/902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28463
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 66.153.219.201
serverIP: 169.70.167.59
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43156,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49308,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.225.202.209",
"serverIP": "92.232.218.135"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.