input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:92.232.218.135/43156 dst dmz-1:123.225.202.209/49308 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43156
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49308
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.225.202.209
serverIP: 92.232.218.135
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43156,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49308,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "109.172.109.24",
"serverIP": "81.67.157.234"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:41: %ASA-4-106023: Deny tcp src outside:81.67.157.234/43156 dst dmz-1:109.172.109.24/49308 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43156
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49308
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 109.172.109.24
serverIP: 81.67.157.234
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5405,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36104,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.112.117.130",
"serverIP": "179.11.163.160"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:67.112.117.130/36104 dst dmz-1:179.11.163.160/5405 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5405
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36104
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 67.112.117.130
serverIP: 179.11.163.160
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5405,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36104,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "136.87.91.122",
"serverIP": "67.131.44.64"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:44: %ASA-4-106023: Deny tcp src outside:136.87.91.122/36104 dst dmz-1:67.131.44.64/5405 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5405
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36104
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 136.87.91.122
serverIP: 67.131.44.64
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51543,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.38.242.75",
"serverIP": "176.182.180.124"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:11.38.242.75/51543 dst dmz-1:176.182.180.124/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51543
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.38.242.75
serverIP: 176.182.180.124
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51543,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.235.9.71",
"serverIP": "132.128.150.175"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:51: %ASA-4-106023: Deny tcp src outside:125.235.9.71/51543 dst dmz-1:132.128.150.175/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51543
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.235.9.71
serverIP: 132.128.150.175
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 4261,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.216.164.100",
"serverIP": "230.143.17.251"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:79.216.164.100/4261 dst dmz-1:230.143.17.251/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 4261
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.216.164.100
serverIP: 230.143.17.251
|
Explain this syslog message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 4261,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "179.226.199.71",
"serverIP": "108.209.158.58"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:36:52: %ASA-4-106023: Deny tcp src outside:179.226.199.71/4261 dst dmz-1:108.209.158.58/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 4261
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 179.226.199.71
serverIP: 108.209.158.58
|
Explain this syslog message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46965,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.55.204.0",
"serverIP": "144.169.140.130"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:50.55.204.0/46965 dst dmz-1:144.169.140.130/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46965
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.55.204.0
serverIP: 144.169.140.130
|
Explain this syslog message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46965,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "110.156.224.58",
"serverIP": "210.40.143.180"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:37:39: %ASA-4-106023: Deny tcp src outside:110.156.224.58/46965 dst dmz-1:210.40.143.180/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46965
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 110.156.224.58
serverIP: 210.40.143.180
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3572,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43882,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "159.184.178.6",
"serverIP": "221.4.179.128"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:159.184.178.6/43882 dst dmz-1:221.4.179.128/3572 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3572
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43882
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 159.184.178.6
serverIP: 221.4.179.128
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3572,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43882,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.118.250.149",
"serverIP": "164.136.98.35"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:02: %ASA-4-106023: Deny tcp src outside:200.118.250.149/43882 dst dmz-1:164.136.98.35/3572 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3572
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43882
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.118.250.149
serverIP: 164.136.98.35
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28463,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "47.45.16.243",
"serverIP": "208.215.105.47"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:47.45.16.243/28463 dst dmz-1:208.215.105.47/902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28463
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 47.45.16.243
serverIP: 208.215.105.47
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28463,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "87.52.116.79",
"serverIP": "123.69.208.190"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:10: %ASA-4-106023: Deny tcp src outside:87.52.116.79/28463 dst dmz-1:123.69.208.190/902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28463
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 87.52.116.79
serverIP: 123.69.208.190
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9250,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58843,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.26.9.25",
"serverIP": "8.164.46.27"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:125.26.9.25/58843 dst dmz-1:8.164.46.27/9250 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9250
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58843
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.26.9.25
serverIP: 8.164.46.27
|
Explain this syslog message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9250,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58843,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "182.99.160.146",
"serverIP": "133.157.112.105"
}
|
Create a JSON artifact from the message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 02 2022 17:38:18: %ASA-4-106023: Deny tcp src outside:182.99.160.146/58843 dst dmz-1:133.157.112.105/9250 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9250
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58843
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 182.99.160.146
serverIP: 133.157.112.105
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "206.4.127.251",
"serverIP": "0.90.12.52"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:206.4.127.251/55860 dst dmz-1:0.90.12.52/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 206.4.127.251
serverIP: 0.90.12.52
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.107.141.81",
"serverIP": "234.117.227.158"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:38.107.141.81/55860 dst dmz-1:234.117.227.158/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 38.107.141.81
serverIP: 234.117.227.158
|
Explain this syslog message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6914,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50397,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "14.203.170.97",
"serverIP": "164.202.2.40"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:14.203.170.97/50397 dst dmz-1:164.202.2.40/6914 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6914
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50397
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 14.203.170.97
serverIP: 164.202.2.40
|
Explain this syslog message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6914,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50397,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "248.240.140.46",
"serverIP": "112.162.91.55"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:01:47: %ASA-4-106023: Deny tcp src outside:248.240.140.46/50397 dst dmz-1:112.162.91.55/6914 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6914
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50397
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 248.240.140.46
serverIP: 112.162.91.55
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "156.237.225.187",
"serverIP": "48.178.61.2"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:156.237.225.187/55860 dst dmz-1:48.178.61.2/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 156.237.225.187
serverIP: 48.178.61.2
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.181.48.120",
"serverIP": "21.251.100.190"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:26: %ASA-4-106023: Deny tcp src outside:20.181.48.120/55860 dst dmz-1:21.251.100.190/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.181.48.120
serverIP: 21.251.100.190
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "99.87.133.179",
"serverIP": "242.243.156.246"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:99.87.133.179/55860 dst dmz-1:242.243.156.246/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 99.87.133.179
serverIP: 242.243.156.246
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "210.226.91.168",
"serverIP": "36.137.213.101"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:210.226.91.168/55860 dst dmz-1:36.137.213.101/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 210.226.91.168
serverIP: 36.137.213.101
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "146.98.253.235",
"serverIP": "89.244.72.26"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:146.98.253.235/55860 dst dmz-1:89.244.72.26/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 146.98.253.235
serverIP: 89.244.72.26
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "113.66.154.135",
"serverIP": "137.232.49.235"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:113.66.154.135/55860 dst dmz-1:137.232.49.235/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 113.66.154.135
serverIP: 137.232.49.235
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "236.232.157.85",
"serverIP": "126.9.44.17"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:236.232.157.85/55860 dst dmz-1:126.9.44.17/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 236.232.157.85
serverIP: 126.9.44.17
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "139.224.191.53",
"serverIP": "160.22.127.77"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:139.224.191.53/55860 dst dmz-1:160.22.127.77/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 139.224.191.53
serverIP: 160.22.127.77
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25317,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44818,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.60.248.119",
"serverIP": "38.160.48.154"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:38.160.48.154/25317 dst dmz-1:119.60.248.119/44818 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25317
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44818
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.60.248.119
serverIP: 38.160.48.154
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25317,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44818,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "187.185.74.216",
"serverIP": "34.249.2.233"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:31: %ASA-4-106023: Deny tcp src outside:34.249.2.233/25317 dst dmz-1:187.185.74.216/44818 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25317
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44818
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 187.185.74.216
serverIP: 34.249.2.233
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8590,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17016,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.13.124.216",
"serverIP": "215.133.253.34"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:76.13.124.216/17016 dst dmz-1:215.133.253.34/8590 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8590
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17016
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 76.13.124.216
serverIP: 215.133.253.34
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8590,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17016,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.103.218.83",
"serverIP": "81.120.147.234"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:19: %ASA-4-106023: Deny tcp src outside:38.103.218.83/17016 dst dmz-1:81.120.147.234/8590 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8590
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17016
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 38.103.218.83
serverIP: 81.120.147.234
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8159,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56183,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "44.169.0.54",
"serverIP": "235.117.154.31"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:44.169.0.54/56183 dst dmz-1:235.117.154.31/8159 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8159
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56183
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 44.169.0.54
serverIP: 235.117.154.31
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8159,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56183,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "81.83.1.39",
"serverIP": "238.122.40.160"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:30: %ASA-4-106023: Deny tcp src outside:81.83.1.39/56183 dst dmz-1:238.122.40.160/8159 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8159
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56183
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 81.83.1.39
serverIP: 238.122.40.160
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.