input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2834,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 5123,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "177.249.31.61",
"serverIP": "93.143.37.75"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:93.143.37.75/2834 dst dmz-1:177.249.31.61/5123 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2834
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 5123
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 177.249.31.61
serverIP: 93.143.37.75
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2834,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 5123,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "84.153.54.220",
"serverIP": "245.90.125.194"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:40: %ASA-4-106023: Deny tcp src outside:245.90.125.194/2834 dst dmz-1:84.153.54.220/5123 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2834
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 5123
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 84.153.54.220
serverIP: 245.90.125.194
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21342,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53135,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "108.172.127.55",
"serverIP": "142.166.184.245"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:108.172.127.55/53135 dst dmz-1:142.166.184.245/21342 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21342
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53135
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 108.172.127.55
serverIP: 142.166.184.245
|
Explain this syslog message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21342,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53135,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "224.94.230.87",
"serverIP": "67.193.146.159"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:02:58: %ASA-4-106023: Deny tcp src outside:224.94.230.87/53135 dst dmz-1:67.193.146.159/21342 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21342
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53135
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 224.94.230.87
serverIP: 67.193.146.159
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4840,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32791,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "238.232.171.4",
"serverIP": "217.59.234.119"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:238.232.171.4/32791 dst dmz-1:217.59.234.119/4840 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4840
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32791
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 238.232.171.4
serverIP: 217.59.234.119
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4840,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32791,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "57.112.4.122",
"serverIP": "102.213.101.17"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:15: %ASA-4-106023: Deny tcp src outside:57.112.4.122/32791 dst dmz-1:102.213.101.17/4840 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4840
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32791
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 57.112.4.122
serverIP: 102.213.101.17
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "121.225.60.31",
"serverIP": "36.121.89.223"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:121.225.60.31/55860 dst dmz-1:36.121.89.223/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 121.225.60.31
serverIP: 36.121.89.223
|
Explain this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "158.250.57.19",
"serverIP": "49.206.236.254"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:03:53: %ASA-4-106023: Deny tcp src outside:158.250.57.19/55860 dst dmz-1:49.206.236.254/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 158.250.57.19
serverIP: 49.206.236.254
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "211.191.82.186",
"serverIP": "156.94.6.91"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:211.191.82.186/55860 dst dmz-1:156.94.6.91/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 211.191.82.186
serverIP: 156.94.6.91
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "16.65.66.242",
"serverIP": "92.204.223.220"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:16.65.66.242/55860 dst dmz-1:92.204.223.220/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 16.65.66.242
serverIP: 92.204.223.220
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "92.114.240.229",
"serverIP": "51.137.77.154"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:92.114.240.229/38408 dst dmz-1:51.137.77.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 92.114.240.229
serverIP: 51.137.77.154
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "139.184.50.202",
"serverIP": "135.5.56.108"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:37: %ASA-4-106023: Deny tcp src outside:139.184.50.202/38408 dst dmz-1:135.5.56.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 139.184.50.202
serverIP: 135.5.56.108
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "251.94.206.80",
"serverIP": "245.33.249.207"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:251.94.206.80/55860 dst dmz-1:245.33.249.207/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 251.94.206.80
serverIP: 245.33.249.207
|
Explain this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44719,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55860,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "237.68.205.164",
"serverIP": "102.69.200.126"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:04:46: %ASA-4-106023: Deny tcp src outside:237.68.205.164/55860 dst dmz-1:102.69.200.126/44719 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44719
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55860
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 237.68.205.164
serverIP: 102.69.200.126
|
Explain this syslog message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 16441,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "178.159.238.74",
"serverIP": "219.160.150.189"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:178.159.238.74/16441 dst dmz-1:219.160.150.189/5902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 16441
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 178.159.238.74
serverIP: 219.160.150.189
|
Explain this syslog message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5902,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 16441,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.210.66.93",
"serverIP": "135.12.51.151"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:05:17: %ASA-4-106023: Deny tcp src outside:174.210.66.93/16441 dst dmz-1:135.12.51.151/5902 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5902
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 16441
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.210.66.93
serverIP: 135.12.51.151
|
Explain this syslog message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9001,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "73.87.166.221",
"serverIP": "107.213.249.41"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:73.87.166.221/9001 dst dmz-1:107.213.249.41/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9001
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 73.87.166.221
serverIP: 107.213.249.41
|
Explain this syslog message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9001,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "25.236.190.74",
"serverIP": "203.51.114.212"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:05:58: %ASA-4-106023: Deny tcp src outside:25.236.190.74/9001 dst dmz-1:203.51.114.212/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9001
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 25.236.190.74
serverIP: 203.51.114.212
|
Explain this syslog message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "92.249.87.204",
"serverIP": "58.245.239.51"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:92.249.87.204/61000 dst dmz-1:58.245.239.51/9443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 92.249.87.204
serverIP: 58.245.239.51
|
Explain this syslog message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61000,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "51.72.174.182",
"serverIP": "90.42.26.243"
}
|
Create a JSON artifact from the message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Jul 23 2022 09:07:23: %ASA-4-106023: Deny tcp src outside:51.72.174.182/61000 dst dmz-1:90.42.26.243/9443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61000
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 51.72.174.182
serverIP: 90.42.26.243
|
Explain this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 2376,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,",
"action": "block",
"localstarttime": "Apr 1 06:16:35",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 52538,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "111.133.20.195",
"serverIP": "99.210.219.100"
}
|
Create a JSON artifact from the message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,111.133.20.195,99.210.219.100,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 2376
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 1 06:16:35
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 52538
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 111.133.20.195
serverIP: 99.210.219.100
|
Explain this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 2376,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,",
"action": "block",
"localstarttime": "Apr 1 06:16:35",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 52538,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "187.95.166.86",
"serverIP": "179.130.45.141"
}
|
Create a JSON artifact from the message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,187.95.166.86,179.130.45.141,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 2376
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 1 06:16:35
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 52538
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 187.95.166.86
serverIP: 179.130.45.141
|
Explain this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 2376,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,",
"action": "block",
"localstarttime": "Apr 1 06:16:35",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 52538,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "40.219.91.78",
"serverIP": "109.137.167.229"
}
|
Create a JSON artifact from the message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,40.219.91.78,109.137.167.229,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 2376
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 1 06:16:35
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 52538
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 40.219.91.78
serverIP: 109.137.167.229
|
Explain this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
{
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 2376,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,",
"action": "block",
"localstarttime": "Apr 1 06:16:35",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 52538,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "175.233.245.51",
"serverIP": "234.80.42.86"
}
|
Create a JSON artifact from the message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
Product: PAN NGFW
Vendor: Palo Alto
|
Identify this syslog message
|
<14>Apr 1 06:16:35 DC1-PA3220-1 1,2023/04/01 06:16:35,016201032964,TRAFFIC,drop,2560,2023/04/01 06:16:35,175.233.245.51,234.80.42.86,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/13,,Witfoo Log Forward Only,2023/04/01 06:16:35,0,1,52538,2376,0,0,0x0,tcp,deny,60,60,0,1,2023/04/01 06:16:34,0,any,0,4862324767,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-01T06:16:35.726-07:00,,
|
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 2376
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 1 06:16:35
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 52538
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 175.233.245.51
serverIP: 234.80.42.86
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 135,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51031,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "17.97.241.41",
"serverIP": "215.1.88.104"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:17.97.241.41/51031 dst dmz-1:215.1.88.104/135 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 135
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51031
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 17.97.241.41
serverIP: 215.1.88.104
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 135,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51031,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "162.125.5.1",
"serverIP": "125.237.187.158"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:162.125.5.1/51031 dst dmz-1:125.237.187.158/135 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 135
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51031
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 162.125.5.1
serverIP: 125.237.187.158
|
Explain this syslog message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5315,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "189.78.211.88",
"serverIP": "81.45.71.187"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:189.78.211.88/51259 dst dmz-1:81.45.71.187/5315 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5315
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 189.78.211.88
serverIP: 81.45.71.187
|
Explain this syslog message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5315,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "16.29.229.31",
"serverIP": "243.183.23.179"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:37:47: %ASA-4-106023: Deny tcp src outside:16.29.229.31/51259 dst dmz-1:243.183.23.179/5315 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5315
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 16.29.229.31
serverIP: 243.183.23.179
|
Explain this syslog message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "168.176.103.229",
"serverIP": "69.90.57.94"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:168.176.103.229/49102 dst dmz-1:69.90.57.94/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 168.176.103.229
serverIP: 69.90.57.94
|
Explain this syslog message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49102,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "159.63.123.211",
"serverIP": "233.105.13.203"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:37:48: %ASA-4-106023: Deny tcp src outside:159.63.123.211/49102 dst dmz-1:233.105.13.203/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49102
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 159.63.123.211
serverIP: 233.105.13.203
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5555,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60839,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "208.76.132.250",
"serverIP": "24.83.213.3"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:208.76.132.250/60839 dst dmz-1:24.83.213.3/5555 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5555
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60839
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 208.76.132.250
serverIP: 24.83.213.3
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5555,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60839,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "255.67.86.87",
"serverIP": "88.117.203.190"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:05: %ASA-4-106023: Deny tcp src outside:255.67.86.87/60839 dst dmz-1:88.117.203.190/5555 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5555
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60839
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 255.67.86.87
serverIP: 88.117.203.190
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21929,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42234,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "161.59.40.78",
"serverIP": "232.47.8.104"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:161.59.40.78/42234 dst dmz-1:232.47.8.104/21929 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21929
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42234
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 161.59.40.78
serverIP: 232.47.8.104
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21929,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42234,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.219.12.167",
"serverIP": "117.182.131.239"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.