input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:29: %ASA-4-106023: Deny tcp src outside:42.219.12.167/42234 dst dmz-1:117.182.131.239/21929 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 21929 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42234 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 42.219.12.167 serverIP: 117.182.131.239
Explain this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 135, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51031, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "219.169.242.244", "serverIP": "211.214.250.20" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:219.169.242.244/51031 dst dmz-1:211.214.250.20/135 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 135 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51031 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 219.169.242.244 serverIP: 211.214.250.20
Explain this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 135, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51031, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "175.3.134.232", "serverIP": "254.31.193.81" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:42: %ASA-4-106023: Deny tcp src outside:175.3.134.232/51031 dst dmz-1:254.31.193.81/135 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 135 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51031 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 175.3.134.232 serverIP: 254.31.193.81
Explain this syslog message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9955, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 44091, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "27.173.201.55", "serverIP": "14.205.89.253" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:27.173.201.55/44091 dst dmz-1:14.205.89.253/9955 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9955 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 44091 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 27.173.201.55 serverIP: 14.205.89.253
Explain this syslog message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9955, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 44091, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "197.130.95.39", "serverIP": "105.195.217.124" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:38:53: %ASA-4-106023: Deny tcp src outside:197.130.95.39/44091 dst dmz-1:105.195.217.124/9955 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9955 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 44091 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 197.130.95.39 serverIP: 105.195.217.124
Explain this syslog message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52459, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "140.120.97.30", "serverIP": "37.140.213.187" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:140.120.97.30/52459 dst dmz-1:37.140.213.187/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52459 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 140.120.97.30 serverIP: 37.140.213.187
Explain this syslog message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52459, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "190.72.54.69", "serverIP": "152.196.154.159" }
Create a JSON artifact from the message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 13 2022 03:39:24: %ASA-4-106023: Deny tcp src outside:190.72.54.69/52459 dst dmz-1:152.196.154.159/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52459 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 190.72.54.69 serverIP: 152.196.154.159
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 45516, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3210, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "53.87.56.2", "serverIP": "239.253.19.90" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:53.87.56.2/45516 dst DMZ:239.253.19.90/3210 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 45516 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3210 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 53.87.56.2 serverIP: 239.253.19.90
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 45516, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3210, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "1.248.143.0", "serverIP": "11.50.169.231" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:1.248.143.0/45516 dst DMZ:11.50.169.231/3210 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 45516 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3210 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 1.248.143.0 serverIP: 11.50.169.231
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 45516, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3210, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "124.130.197.216", "serverIP": "177.131.186.178" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:124.130.197.216/45516 dst DMZ:177.131.186.178/3210 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 45516 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3210 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 124.130.197.216 serverIP: 177.131.186.178
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 45516, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3210, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "76.97.83.212", "serverIP": "88.29.214.10" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny tcp src outside:76.97.83.212/45516 dst DMZ:88.29.214.10/3210 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 45516 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3210 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 76.97.83.212 serverIP: 88.29.214.10
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 38680, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 17, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 53, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "73.204.200.28", "serverIP": "241.77.129.241" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:73.204.200.28/38680 dst DMZ:241.77.129.241/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 38680 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 17 senderhost: 172.20.1.1 sensitivity: normal serverport: 53 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 73.204.200.28 serverIP: 241.77.129.241
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 38680, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 17, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 53, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "42.88.206.192", "serverIP": "188.73.13.234" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:42.88.206.192/38680 dst DMZ:188.73.13.234/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 38680 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 17 senderhost: 172.20.1.1 sensitivity: normal serverport: 53 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 42.88.206.192 serverIP: 188.73.13.234
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 38680, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 17, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 53, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "95.134.177.194", "serverIP": "215.119.126.51" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:95.134.177.194/38680 dst DMZ:215.119.126.51/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 38680 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 17 senderhost: 172.20.1.1 sensitivity: normal serverport: 53 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 95.134.177.194 serverIP: 215.119.126.51
Explain this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 38680, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 17, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 53, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "89.170.127.76", "serverIP": "149.148.27.233" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:04: %ASA-4-106023: Deny udp src outside:89.170.127.76/38680 dst DMZ:149.148.27.233/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 38680 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 17 senderhost: 172.20.1.1 sensitivity: normal serverport: 53 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 89.170.127.76 serverIP: 149.148.27.233
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "231.17.121.66", "serverIP": "131.164.108.78" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:231.17.121.66/49376 dst DMZ:131.164.108.78/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 231.17.121.66 serverIP: 131.164.108.78
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "129.13.11.232", "serverIP": "17.62.75.178" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:129.13.11.232/49376 dst DMZ:17.62.75.178/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 129.13.11.232 serverIP: 17.62.75.178
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "177.168.126.93", "serverIP": "184.80.116.23" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:177.168.126.93/49376 dst DMZ:184.80.116.23/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 177.168.126.93 serverIP: 184.80.116.23
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "2.201.64.147", "serverIP": "57.246.140.248" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:2.201.64.147/49376 dst DMZ:57.246.140.248/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 2.201.64.147 serverIP: 57.246.140.248
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "80.119.37.88", "serverIP": "218.133.149.197" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:80.119.37.88/49376 dst DMZ:218.133.149.197/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 80.119.37.88 serverIP: 218.133.149.197
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "214.238.160.157", "serverIP": "80.51.110.172" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:214.238.160.157/49376 dst DMZ:80.51.110.172/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 214.238.160.157 serverIP: 80.51.110.172
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "110.79.128.154", "serverIP": "46.42.85.29" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:110.79.128.154/49376 dst DMZ:46.42.85.29/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 110.79.128.154 serverIP: 46.42.85.29
Explain this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49376, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 4018, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "23.186.11.124", "serverIP": "222.160.103.96" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:03:36: %ASA-4-106023: Deny tcp src outside:23.186.11.124/49376 dst DMZ:222.160.103.96/4018 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49376 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 4018 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 23.186.11.124 serverIP: 222.160.103.96
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "76.81.192.210", "serverIP": "61.149.219.0" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:76.81.192.210/55863 dst DMZ:61.149.219.0/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 76.81.192.210 serverIP: 61.149.219.0
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "237.13.158.177", "serverIP": "136.220.39.83" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:237.13.158.177/55863 dst DMZ:136.220.39.83/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 237.13.158.177 serverIP: 136.220.39.83
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "6.184.138.108", "serverIP": "51.21.69.213" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:6.184.138.108/55863 dst DMZ:51.21.69.213/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 6.184.138.108 serverIP: 51.21.69.213
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "72.68.115.127", "serverIP": "134.207.69.20" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:72.68.115.127/55863 dst DMZ:134.207.69.20/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 72.68.115.127 serverIP: 134.207.69.20
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "46.82.14.66", "serverIP": "121.182.152.247" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:46.82.14.66/55863 dst DMZ:121.182.152.247/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 46.82.14.66 serverIP: 121.182.152.247
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "64.188.66.250", "serverIP": "52.185.40.238" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:64.188.66.250/55863 dst DMZ:52.185.40.238/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 64.188.66.250 serverIP: 52.185.40.238
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "210.51.90.141", "serverIP": "34.31.199.226" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:210.51.90.141/55863 dst DMZ:34.31.199.226/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 210.51.90.141 serverIP: 34.31.199.226
Explain this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55863, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 10011, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "9.148.198.46", "serverIP": "76.214.116.118" }
Create a JSON artifact from the message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Feb 24 2024 02:04:02: %ASA-4-106023: Deny tcp src outside:9.148.198.46/55863 dst DMZ:76.214.116.118/10011 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55863 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 10011 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 9.148.198.46 serverIP: 76.214.116.118
Explain this syslog message
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 45001, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 37605, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "194.146.226.197", "serverIP": "217.39.37.138" }
Create a JSON artifact from the message
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jul 23 2023 19:40:21: %ASA-4-106023: Deny tcp src outside:217.39.37.138/37605 dst inside:194.146.226.197/45001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 45001 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 37605 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 194.146.226.197 serverIP: 217.39.37.138
Explain this syslog message
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49163, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 35012, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "52.137.70.149", "serverIP": "35.243.166.210" }
Create a JSON artifact from the message
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.243.166.210/35012 dst DMZ:52.137.70.149/49163 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 49163 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 35012 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 52.137.70.149 serverIP: 35.243.166.210
Explain this syslog message
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 49163, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 35012, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "80.175.20.30", "serverIP": "210.215.16.20" }
Create a JSON artifact from the message
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message