input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43156 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49308 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 123.225.202.209 serverIP: 92.232.218.135
Explain this syslog message
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43156, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49308, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "109.172.109.24", "serverIP": "81.67.157.234" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43156 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49308 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 109.172.109.24 serverIP: 81.67.157.234
Explain this syslog message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5405, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36104, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.112.117.130", "serverIP": "179.11.163.160" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5405 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36104 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 67.112.117.130 serverIP: 179.11.163.160
Explain this syslog message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5405, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36104, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "136.87.91.122", "serverIP": "67.131.44.64" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5405 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36104 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 136.87.91.122 serverIP: 67.131.44.64
Explain this syslog message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51543, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "11.38.242.75", "serverIP": "176.182.180.124" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51543 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 11.38.242.75 serverIP: 176.182.180.124
Explain this syslog message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51543, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "125.235.9.71", "serverIP": "132.128.150.175" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51543 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 125.235.9.71 serverIP: 132.128.150.175
Explain this syslog message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 4261, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "79.216.164.100", "serverIP": "230.143.17.251" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 4261 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 79.216.164.100 serverIP: 230.143.17.251
Explain this syslog message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 4261, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "179.226.199.71", "serverIP": "108.209.158.58" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 4261 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 179.226.199.71 serverIP: 108.209.158.58
Explain this syslog message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46965, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "50.55.204.0", "serverIP": "144.169.140.130" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46965 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 50.55.204.0 serverIP: 144.169.140.130
Explain this syslog message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46965, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "110.156.224.58", "serverIP": "210.40.143.180" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46965 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 110.156.224.58 serverIP: 210.40.143.180
Explain this syslog message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3572, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43882, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "159.184.178.6", "serverIP": "221.4.179.128" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3572 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43882 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 159.184.178.6 serverIP: 221.4.179.128
Explain this syslog message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3572, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43882, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.118.250.149", "serverIP": "164.136.98.35" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3572 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43882 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.118.250.149 serverIP: 164.136.98.35
Explain this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28463, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "47.45.16.243", "serverIP": "208.215.105.47" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28463 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 47.45.16.243 serverIP: 208.215.105.47
Explain this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28463, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "87.52.116.79", "serverIP": "123.69.208.190" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28463 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 87.52.116.79 serverIP: 123.69.208.190
Explain this syslog message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9250, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58843, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "125.26.9.25", "serverIP": "8.164.46.27" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9250 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58843 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 125.26.9.25 serverIP: 8.164.46.27
Explain this syslog message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9250, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58843, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "182.99.160.146", "serverIP": "133.157.112.105" }
Create a JSON artifact from the message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9250 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58843 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 182.99.160.146 serverIP: 133.157.112.105
Explain this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "206.4.127.251", "serverIP": "0.90.12.52" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 206.4.127.251 serverIP: 0.90.12.52
Explain this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "38.107.141.81", "serverIP": "234.117.227.158" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 38.107.141.81 serverIP: 234.117.227.158
Explain this syslog message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6914, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50397, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "14.203.170.97", "serverIP": "164.202.2.40" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6914 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50397 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 14.203.170.97 serverIP: 164.202.2.40
Explain this syslog message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6914, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50397, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "248.240.140.46", "serverIP": "112.162.91.55" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6914 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50397 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 248.240.140.46 serverIP: 112.162.91.55
Explain this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "156.237.225.187", "serverIP": "48.178.61.2" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 156.237.225.187 serverIP: 48.178.61.2
Explain this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.181.48.120", "serverIP": "21.251.100.190" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.181.48.120 serverIP: 21.251.100.190
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "99.87.133.179", "serverIP": "242.243.156.246" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 99.87.133.179 serverIP: 242.243.156.246
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "210.226.91.168", "serverIP": "36.137.213.101" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 210.226.91.168 serverIP: 36.137.213.101
Explain this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "146.98.253.235", "serverIP": "89.244.72.26" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 146.98.253.235 serverIP: 89.244.72.26
Explain this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "113.66.154.135", "serverIP": "137.232.49.235" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 113.66.154.135 serverIP: 137.232.49.235
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "236.232.157.85", "serverIP": "126.9.44.17" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 236.232.157.85 serverIP: 126.9.44.17
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "139.224.191.53", "serverIP": "160.22.127.77" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 139.224.191.53 serverIP: 160.22.127.77
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25317, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 44818, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.60.248.119", "serverIP": "38.160.48.154" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25317 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 44818 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.60.248.119 serverIP: 38.160.48.154
Explain this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25317, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 44818, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "187.185.74.216", "serverIP": "34.249.2.233" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25317 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 44818 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 187.185.74.216 serverIP: 34.249.2.233
Explain this syslog message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8590, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 17016, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "76.13.124.216", "serverIP": "215.133.253.34" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8590 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 17016 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 76.13.124.216 serverIP: 215.133.253.34
Explain this syslog message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8590, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 17016, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "38.103.218.83", "serverIP": "81.120.147.234" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8590 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 17016 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 38.103.218.83 serverIP: 81.120.147.234
Explain this syslog message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8159, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56183, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "44.169.0.54", "serverIP": "235.117.154.31" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8159 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56183 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 44.169.0.54 serverIP: 235.117.154.31
Explain this syslog message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8159, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56183, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "81.83.1.39", "serverIP": "238.122.40.160" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8159 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56183 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 81.83.1.39 serverIP: 238.122.40.160
Explain this syslog message