input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21929
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42234
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 42.219.12.167
serverIP: 117.182.131.239
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 135,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51031,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "219.169.242.244",
"serverIP": "211.214.250.20"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 135
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51031
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 219.169.242.244
serverIP: 211.214.250.20
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 135,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51031,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "175.3.134.232",
"serverIP": "254.31.193.81"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 135
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51031
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 175.3.134.232
serverIP: 254.31.193.81
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9955,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44091,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "27.173.201.55",
"serverIP": "14.205.89.253"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9955
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44091
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 27.173.201.55
serverIP: 14.205.89.253
|
Explain this syslog message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9955,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44091,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "197.130.95.39",
"serverIP": "105.195.217.124"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9955
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44091
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 197.130.95.39
serverIP: 105.195.217.124
|
Explain this syslog message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52459,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.120.97.30",
"serverIP": "37.140.213.187"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52459
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.120.97.30
serverIP: 37.140.213.187
|
Explain this syslog message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52459,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "190.72.54.69",
"serverIP": "152.196.154.159"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52459
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 190.72.54.69
serverIP: 152.196.154.159
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45516,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3210,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "53.87.56.2",
"serverIP": "239.253.19.90"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45516
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3210
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 53.87.56.2
serverIP: 239.253.19.90
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45516,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3210,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "1.248.143.0",
"serverIP": "11.50.169.231"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45516
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3210
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 1.248.143.0
serverIP: 11.50.169.231
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45516,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3210,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "124.130.197.216",
"serverIP": "177.131.186.178"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45516
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3210
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 124.130.197.216
serverIP: 177.131.186.178
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45516,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3210,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "76.97.83.212",
"serverIP": "88.29.214.10"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45516
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3210
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 76.97.83.212
serverIP: 88.29.214.10
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 38680,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "73.204.200.28",
"serverIP": "241.77.129.241"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 38680
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 53
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 73.204.200.28
serverIP: 241.77.129.241
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 38680,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "42.88.206.192",
"serverIP": "188.73.13.234"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 38680
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 53
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 42.88.206.192
serverIP: 188.73.13.234
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 38680,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "95.134.177.194",
"serverIP": "215.119.126.51"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 38680
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 53
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 95.134.177.194
serverIP: 215.119.126.51
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 38680,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 53,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "89.170.127.76",
"serverIP": "149.148.27.233"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 38680
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 53
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 89.170.127.76
serverIP: 149.148.27.233
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "231.17.121.66",
"serverIP": "131.164.108.78"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 231.17.121.66
serverIP: 131.164.108.78
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "129.13.11.232",
"serverIP": "17.62.75.178"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 129.13.11.232
serverIP: 17.62.75.178
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "177.168.126.93",
"serverIP": "184.80.116.23"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 177.168.126.93
serverIP: 184.80.116.23
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "2.201.64.147",
"serverIP": "57.246.140.248"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 2.201.64.147
serverIP: 57.246.140.248
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "80.119.37.88",
"serverIP": "218.133.149.197"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 80.119.37.88
serverIP: 218.133.149.197
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "214.238.160.157",
"serverIP": "80.51.110.172"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 214.238.160.157
serverIP: 80.51.110.172
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "110.79.128.154",
"serverIP": "46.42.85.29"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 110.79.128.154
serverIP: 46.42.85.29
|
Explain this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49376,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 4018,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "23.186.11.124",
"serverIP": "222.160.103.96"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49376
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 4018
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 23.186.11.124
serverIP: 222.160.103.96
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "76.81.192.210",
"serverIP": "61.149.219.0"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 76.81.192.210
serverIP: 61.149.219.0
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "237.13.158.177",
"serverIP": "136.220.39.83"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 237.13.158.177
serverIP: 136.220.39.83
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "6.184.138.108",
"serverIP": "51.21.69.213"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 6.184.138.108
serverIP: 51.21.69.213
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "72.68.115.127",
"serverIP": "134.207.69.20"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 72.68.115.127
serverIP: 134.207.69.20
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "46.82.14.66",
"serverIP": "121.182.152.247"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 46.82.14.66
serverIP: 121.182.152.247
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "64.188.66.250",
"serverIP": "52.185.40.238"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 64.188.66.250
serverIP: 52.185.40.238
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "210.51.90.141",
"serverIP": "34.31.199.226"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 210.51.90.141
serverIP: 34.31.199.226
|
Explain this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55863,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 10011,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "9.148.198.46",
"serverIP": "76.214.116.118"
}
|
Create a JSON artifact from the message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55863
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 10011
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 9.148.198.46
serverIP: 76.214.116.118
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45001,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 37605,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "194.146.226.197",
"serverIP": "217.39.37.138"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45001
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 37605
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 194.146.226.197
serverIP: 217.39.37.138
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49163,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35012,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "52.137.70.149",
"serverIP": "35.243.166.210"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49163
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35012
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 52.137.70.149
serverIP: 35.243.166.210
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49163,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35012,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "80.175.20.30",
"serverIP": "210.215.16.20"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.