input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2834, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 5123, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "177.249.31.61", "serverIP": "93.143.37.75" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2834 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 5123 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 177.249.31.61 serverIP: 93.143.37.75
Explain this syslog message
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2834, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 5123, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "84.153.54.220", "serverIP": "245.90.125.194" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2834 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 5123 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 84.153.54.220 serverIP: 245.90.125.194
Explain this syslog message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 21342, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53135, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "108.172.127.55", "serverIP": "142.166.184.245" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 21342 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53135 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 108.172.127.55 serverIP: 142.166.184.245
Explain this syslog message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 21342, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53135, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "224.94.230.87", "serverIP": "67.193.146.159" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 21342 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53135 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 224.94.230.87 serverIP: 67.193.146.159
Explain this syslog message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4840, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32791, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "238.232.171.4", "serverIP": "217.59.234.119" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4840 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32791 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 238.232.171.4 serverIP: 217.59.234.119
Explain this syslog message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4840, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32791, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "57.112.4.122", "serverIP": "102.213.101.17" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4840 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32791 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 57.112.4.122 serverIP: 102.213.101.17
Explain this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "121.225.60.31", "serverIP": "36.121.89.223" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 121.225.60.31 serverIP: 36.121.89.223
Explain this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "158.250.57.19", "serverIP": "49.206.236.254" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 158.250.57.19 serverIP: 49.206.236.254
Explain this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "211.191.82.186", "serverIP": "156.94.6.91" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 211.191.82.186 serverIP: 156.94.6.91
Explain this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "16.65.66.242", "serverIP": "92.204.223.220" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 16.65.66.242 serverIP: 92.204.223.220
Explain this syslog message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "92.114.240.229", "serverIP": "51.137.77.154" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 92.114.240.229 serverIP: 51.137.77.154
Explain this syslog message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "139.184.50.202", "serverIP": "135.5.56.108" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 139.184.50.202 serverIP: 135.5.56.108
Explain this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "251.94.206.80", "serverIP": "245.33.249.207" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 251.94.206.80 serverIP: 245.33.249.207
Explain this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44719, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55860, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "237.68.205.164", "serverIP": "102.69.200.126" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44719 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55860 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 237.68.205.164 serverIP: 102.69.200.126
Explain this syslog message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 16441, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "178.159.238.74", "serverIP": "219.160.150.189" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 16441 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 178.159.238.74 serverIP: 219.160.150.189
Explain this syslog message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5902, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 16441, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.210.66.93", "serverIP": "135.12.51.151" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5902 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 16441 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.210.66.93 serverIP: 135.12.51.151
Explain this syslog message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9001, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "73.87.166.221", "serverIP": "107.213.249.41" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9001 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 73.87.166.221 serverIP: 107.213.249.41
Explain this syslog message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9001, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "25.236.190.74", "serverIP": "203.51.114.212" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9001 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 25.236.190.74 serverIP: 203.51.114.212
Explain this syslog message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "92.249.87.204", "serverIP": "58.245.239.51" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 92.249.87.204 serverIP: 58.245.239.51
Explain this syslog message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61000, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "51.72.174.182", "serverIP": "90.42.26.243" }
Create a JSON artifact from the message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61000 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 51.72.174.182 serverIP: 90.42.26.243
Explain this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 2376, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,", "action": "block", "localstarttime": "Apr 1 06:16:35", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 52538, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "111.133.20.195", "serverIP": "99.210.219.100" }
Create a JSON artifact from the message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 2376 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20, 0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 1 06:16:35 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 52538 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 111.133.20.195 serverIP: 99.210.219.100
Explain this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 2376, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,", "action": "block", "localstarttime": "Apr 1 06:16:35", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 52538, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "187.95.166.86", "serverIP": "179.130.45.141" }
Create a JSON artifact from the message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 2376 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20, 0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 1 06:16:35 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 52538 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 187.95.166.86 serverIP: 179.130.45.141
Explain this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 2376, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,", "action": "block", "localstarttime": "Apr 1 06:16:35", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 52538, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "40.219.91.78", "serverIP": "109.137.167.229" }
Create a JSON artifact from the message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 2376 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20, 0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 1 06:16:35 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 52538 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 40.219.91.78 serverIP: 109.137.167.229
Explain this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 2376, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,", "action": "block", "localstarttime": "Apr 1 06:16:35", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 52538, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "175.233.245.51", "serverIP": "234.80.42.86" }
Create a JSON artifact from the message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 2376 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20, 0] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 1 06:16:35 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 52538 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 175.233.245.51 serverIP: 234.80.42.86
Explain this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 135, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51031, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "17.97.241.41", "serverIP": "215.1.88.104" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 135 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51031 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 17.97.241.41 serverIP: 215.1.88.104
Explain this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 135, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51031, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "162.125.5.1", "serverIP": "125.237.187.158" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 135 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51031 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 162.125.5.1 serverIP: 125.237.187.158
Explain this syslog message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5315, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "189.78.211.88", "serverIP": "81.45.71.187" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5315 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 189.78.211.88 serverIP: 81.45.71.187
Explain this syslog message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5315, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "16.29.229.31", "serverIP": "243.183.23.179" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5315 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 16.29.229.31 serverIP: 243.183.23.179
Explain this syslog message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "168.176.103.229", "serverIP": "69.90.57.94" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 168.176.103.229 serverIP: 69.90.57.94
Explain this syslog message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49102, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "159.63.123.211", "serverIP": "233.105.13.203" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49102 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 159.63.123.211 serverIP: 233.105.13.203
Explain this syslog message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5555, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60839, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "208.76.132.250", "serverIP": "24.83.213.3" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5555 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60839 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 208.76.132.250 serverIP: 24.83.213.3
Explain this syslog message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5555, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60839, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "255.67.86.87", "serverIP": "88.117.203.190" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5555 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60839 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 255.67.86.87 serverIP: 88.117.203.190
Explain this syslog message
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 21929, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42234, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "161.59.40.78", "serverIP": "232.47.8.104" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 21929 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42234 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 161.59.40.78 serverIP: 232.47.8.104
Explain this syslog message
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 21929, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42234, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "42.219.12.167", "serverIP": "117.182.131.239" }
Create a JSON artifact from the message