input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:210.215.16.20/35012 dst DMZ:80.175.20.30/49163 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49163
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35012
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 80.175.20.30
serverIP: 210.215.16.20
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:75.180.160.40/35012 dst DMZ:146.77.184.124/49163 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49163,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:75.180.160.40/35012 dst DMZ:146.77.184.124/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35012,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "146.77.184.124",
"serverIP": "75.180.160.40"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:75.180.160.40/35012 dst DMZ:146.77.184.124/49163 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:75.180.160.40/35012 dst DMZ:146.77.184.124/49163 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49163
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35012
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 146.77.184.124
serverIP: 75.180.160.40
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:166.115.179.151/35012 dst DMZ:98.35.209.143/49163 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49163,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:166.115.179.151/35012 dst DMZ:98.35.209.143/49163 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35012,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "98.35.209.143",
"serverIP": "166.115.179.151"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:166.115.179.151/35012 dst DMZ:98.35.209.143/49163 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:166.115.179.151/35012 dst DMZ:98.35.209.143/49163 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49163
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35012
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 98.35.209.143
serverIP: 166.115.179.151
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:62.178.154.22/40743 dst DMZ:45.218.2.113/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:62.178.154.22/40743 dst DMZ:45.218.2.113/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "62.178.154.22",
"serverIP": "45.218.2.113"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:62.178.154.22/40743 dst DMZ:45.218.2.113/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:62.178.154.22/40743 dst DMZ:45.218.2.113/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 62.178.154.22
serverIP: 45.218.2.113
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:71.38.196.174/40743 dst DMZ:197.222.155.83/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:71.38.196.174/40743 dst DMZ:197.222.155.83/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "71.38.196.174",
"serverIP": "197.222.155.83"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:71.38.196.174/40743 dst DMZ:197.222.155.83/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:71.38.196.174/40743 dst DMZ:197.222.155.83/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 71.38.196.174
serverIP: 197.222.155.83
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:27.20.131.57/49478 dst DMZ:139.207.161.184/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:27.20.131.57/49478 dst DMZ:139.207.161.184/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "27.20.131.57",
"serverIP": "139.207.161.184"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:27.20.131.57/49478 dst DMZ:139.207.161.184/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:27.20.131.57/49478 dst DMZ:139.207.161.184/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 27.20.131.57
serverIP: 139.207.161.184
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:193.71.198.53/49478 dst DMZ:35.1.95.189/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:193.71.198.53/49478 dst DMZ:35.1.95.189/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "193.71.198.53",
"serverIP": "35.1.95.189"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:193.71.198.53/49478 dst DMZ:35.1.95.189/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:193.71.198.53/49478 dst DMZ:35.1.95.189/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 193.71.198.53
serverIP: 35.1.95.189
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:126.62.49.54/49478 dst DMZ:15.232.167.195/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:126.62.49.54/49478 dst DMZ:15.232.167.195/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "126.62.49.54",
"serverIP": "15.232.167.195"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:126.62.49.54/49478 dst DMZ:15.232.167.195/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:126.62.49.54/49478 dst DMZ:15.232.167.195/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 126.62.49.54
serverIP: 15.232.167.195
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:136.192.212.188/49478 dst DMZ:85.124.16.187/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:136.192.212.188/49478 dst DMZ:85.124.16.187/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "136.192.212.188",
"serverIP": "85.124.16.187"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:136.192.212.188/49478 dst DMZ:85.124.16.187/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:136.192.212.188/49478 dst DMZ:85.124.16.187/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 136.192.212.188
serverIP: 85.124.16.187
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.183.187.65/49478 dst DMZ:17.120.28.1/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.183.187.65/49478 dst DMZ:17.120.28.1/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "35.183.187.65",
"serverIP": "17.120.28.1"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.183.187.65/49478 dst DMZ:17.120.28.1/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:35.183.187.65/49478 dst DMZ:17.120.28.1/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 35.183.187.65
serverIP: 17.120.28.1
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:102.165.204.91/49478 dst DMZ:9.180.227.17/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:102.165.204.91/49478 dst DMZ:9.180.227.17/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "102.165.204.91",
"serverIP": "9.180.227.17"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:102.165.204.91/49478 dst DMZ:9.180.227.17/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:102.165.204.91/49478 dst DMZ:9.180.227.17/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 102.165.204.91
serverIP: 9.180.227.17
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:214.248.48.202/49478 dst DMZ:200.78.233.232/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:214.248.48.202/49478 dst DMZ:200.78.233.232/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "214.248.48.202",
"serverIP": "200.78.233.232"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:214.248.48.202/49478 dst DMZ:200.78.233.232/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:214.248.48.202/49478 dst DMZ:200.78.233.232/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 214.248.48.202
serverIP: 200.78.233.232
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:4.7.166.49/49478 dst DMZ:107.155.162.102/82 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49478,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:4.7.166.49/49478 dst DMZ:107.155.162.102/82 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 82,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "4.7.166.49",
"serverIP": "107.155.162.102"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:4.7.166.49/49478 dst DMZ:107.155.162.102/82 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:4.7.166.49/49478 dst DMZ:107.155.162.102/82 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49478
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 82
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 4.7.166.49
serverIP: 107.155.162.102
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:2.204.109.90/40743 dst DMZ:230.252.209.249/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:2.204.109.90/40743 dst DMZ:230.252.209.249/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "2.204.109.90",
"serverIP": "230.252.209.249"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:2.204.109.90/40743 dst DMZ:230.252.209.249/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:2.204.109.90/40743 dst DMZ:230.252.209.249/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 2.204.109.90
serverIP: 230.252.209.249
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:195.47.103.199/40743 dst DMZ:115.194.2.144/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:195.47.103.199/40743 dst DMZ:115.194.2.144/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "195.47.103.199",
"serverIP": "115.194.2.144"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:195.47.103.199/40743 dst DMZ:115.194.2.144/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:195.47.103.199/40743 dst DMZ:115.194.2.144/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 195.47.103.199
serverIP: 115.194.2.144
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:238.245.174.141/50100 dst DMZ:118.86.101.36/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:238.245.174.141/50100 dst DMZ:118.86.101.36/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "238.245.174.141",
"serverIP": "118.86.101.36"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:238.245.174.141/50100 dst DMZ:118.86.101.36/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:238.245.174.141/50100 dst DMZ:118.86.101.36/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 238.245.174.141
serverIP: 118.86.101.36
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:92.6.142.222/50100 dst DMZ:171.91.197.143/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:92.6.142.222/50100 dst DMZ:171.91.197.143/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "92.6.142.222",
"serverIP": "171.91.197.143"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:92.6.142.222/50100 dst DMZ:171.91.197.143/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:92.6.142.222/50100 dst DMZ:171.91.197.143/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 92.6.142.222
serverIP: 171.91.197.143
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:52.178.51.111/50100 dst DMZ:239.231.11.132/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:52.178.51.111/50100 dst DMZ:239.231.11.132/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "52.178.51.111",
"serverIP": "239.231.11.132"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:52.178.51.111/50100 dst DMZ:239.231.11.132/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:52.178.51.111/50100 dst DMZ:239.231.11.132/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 52.178.51.111
serverIP: 239.231.11.132
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:19.88.155.18/50100 dst DMZ:21.84.89.126/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:19.88.155.18/50100 dst DMZ:21.84.89.126/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "19.88.155.18",
"serverIP": "21.84.89.126"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:19.88.155.18/50100 dst DMZ:21.84.89.126/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:19.88.155.18/50100 dst DMZ:21.84.89.126/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 19.88.155.18
serverIP: 21.84.89.126
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:167.234.155.92/50100 dst DMZ:176.111.138.102/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:167.234.155.92/50100 dst DMZ:176.111.138.102/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "167.234.155.92",
"serverIP": "176.111.138.102"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:167.234.155.92/50100 dst DMZ:176.111.138.102/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:167.234.155.92/50100 dst DMZ:176.111.138.102/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 167.234.155.92
serverIP: 176.111.138.102
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:113.242.133.88/50100 dst DMZ:117.113.231.9/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:113.242.133.88/50100 dst DMZ:117.113.231.9/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "113.242.133.88",
"serverIP": "117.113.231.9"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:113.242.133.88/50100 dst DMZ:117.113.231.9/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:113.242.133.88/50100 dst DMZ:117.113.231.9/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 113.242.133.88
serverIP: 117.113.231.9
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:218.179.163.106/40743 dst DMZ:20.243.130.121/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:218.179.163.106/40743 dst DMZ:20.243.130.121/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "218.179.163.106",
"serverIP": "20.243.130.121"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:218.179.163.106/40743 dst DMZ:20.243.130.121/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:218.179.163.106/40743 dst DMZ:20.243.130.121/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 218.179.163.106
serverIP: 20.243.130.121
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:110.16.138.56/40743 dst DMZ:253.170.109.241/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40743,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:110.16.138.56/40743 dst DMZ:253.170.109.241/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "110.16.138.56",
"serverIP": "253.170.109.241"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:110.16.138.56/40743 dst DMZ:253.170.109.241/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:110.16.138.56/40743 dst DMZ:253.170.109.241/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40743
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 110.16.138.56
serverIP: 253.170.109.241
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:169.231.151.63/50100 dst DMZ:234.97.7.152/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:169.231.151.63/50100 dst DMZ:234.97.7.152/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "169.231.151.63",
"serverIP": "234.97.7.152"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:169.231.151.63/50100 dst DMZ:234.97.7.152/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:169.231.151.63/50100 dst DMZ:234.97.7.152/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 169.231.151.63
serverIP: 234.97.7.152
|
Explain this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:24.12.120.4/50100 dst DMZ:85.171.48.101/5245 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 50100,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:24.12.120.4/50100 dst DMZ:85.171.48.101/5245 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5245,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "24.12.120.4",
"serverIP": "85.171.48.101"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:24.12.120.4/50100 dst DMZ:85.171.48.101/5245 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:40:19: %ASA-4-106023: Deny tcp src outside:24.12.120.4/50100 dst DMZ:85.171.48.101/5245 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 50100
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5245
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 24.12.120.4
serverIP: 85.171.48.101
|
Explain this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:47.124.203.224/56666 dst DMZ:18.106.12.191/873 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56666,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:47.124.203.224/56666 dst DMZ:18.106.12.191/873 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 873,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "47.124.203.224",
"serverIP": "18.106.12.191"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:47.124.203.224/56666 dst DMZ:18.106.12.191/873 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:47.124.203.224/56666 dst DMZ:18.106.12.191/873 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56666
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 873
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 47.124.203.224
serverIP: 18.106.12.191
|
Explain this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:110.42.183.201/56666 dst DMZ:254.168.61.15/873 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56666,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:110.42.183.201/56666 dst DMZ:254.168.61.15/873 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 873,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "110.42.183.201",
"serverIP": "254.168.61.15"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:110.42.183.201/56666 dst DMZ:254.168.61.15/873 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:110.42.183.201/56666 dst DMZ:254.168.61.15/873 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56666
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 873
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 110.42.183.201
serverIP: 254.168.61.15
|
Explain this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:22.244.21.54/56666 dst DMZ:6.85.49.85/873 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56666,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:22.244.21.54/56666 dst DMZ:6.85.49.85/873 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 873,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "22.244.21.54",
"serverIP": "6.85.49.85"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:22.244.21.54/56666 dst DMZ:6.85.49.85/873 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:22.244.21.54/56666 dst DMZ:6.85.49.85/873 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56666
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 873
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 22.244.21.54
serverIP: 6.85.49.85
|
Explain this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:190.18.246.39/56666 dst DMZ:62.199.0.118/873 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56666,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:190.18.246.39/56666 dst DMZ:62.199.0.118/873 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 873,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "190.18.246.39",
"serverIP": "62.199.0.118"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:190.18.246.39/56666 dst DMZ:62.199.0.118/873 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:37:35: %ASA-4-106023: Deny tcp src outside:190.18.246.39/56666 dst DMZ:62.199.0.118/873 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56666
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 873
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 190.18.246.39
serverIP: 62.199.0.118
|
Explain this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:161.246.178.233/44602 dst DMZ:160.52.134.72/27970 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 44602,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:161.246.178.233/44602 dst DMZ:160.52.134.72/27970 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 27970,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "161.246.178.233",
"serverIP": "160.52.134.72"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:161.246.178.233/44602 dst DMZ:160.52.134.72/27970 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:161.246.178.233/44602 dst DMZ:160.52.134.72/27970 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 44602
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 27970
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 161.246.178.233
serverIP: 160.52.134.72
|
Explain this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:13.201.4.5/44602 dst DMZ:128.181.62.167/27970 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 44602,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:13.201.4.5/44602 dst DMZ:128.181.62.167/27970 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 27970,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "13.201.4.5",
"serverIP": "128.181.62.167"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:13.201.4.5/44602 dst DMZ:128.181.62.167/27970 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:13.201.4.5/44602 dst DMZ:128.181.62.167/27970 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 44602
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 27970
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 13.201.4.5
serverIP: 128.181.62.167
|
Explain this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:248.57.247.62/44602 dst DMZ:185.254.88.131/27970 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 44602,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:248.57.247.62/44602 dst DMZ:185.254.88.131/27970 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 27970,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "248.57.247.62",
"serverIP": "185.254.88.131"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:248.57.247.62/44602 dst DMZ:185.254.88.131/27970 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:248.57.247.62/44602 dst DMZ:185.254.88.131/27970 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 44602
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 27970
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 248.57.247.62
serverIP: 185.254.88.131
|
Explain this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:1.10.121.254/44602 dst DMZ:11.243.75.130/27970 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 44602,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:1.10.121.254/44602 dst DMZ:11.243.75.130/27970 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 17,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 27970,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "1.10.121.254",
"serverIP": "11.243.75.130"
}
|
Create a JSON artifact from the message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:1.10.121.254/44602 dst DMZ:11.243.75.130/27970 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jul 23 2023 19:17:53: %ASA-4-106023: Deny udp src outside:1.10.121.254/44602 dst DMZ:11.243.75.130/27970 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 44602
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 17
senderhost: 172.20.1.1
sensitivity: normal
serverport: 27970
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 1.10.121.254
serverIP: 11.243.75.130
|
Explain this syslog message
|
2 621470537179 eni-036b2877ddeaea838 17.152.193.105 174.108.222.63 33224 5985 6 1 40 1694019182 1694019203 REJECT OK
|
{
"action": "block",
"clientport": 33224,
"endtimeutc": "1694019203",
"message": "2 621470537179 eni-036b2877ddeaea838 17.152.193.105 174.108.222.63 33224 5985 6 1 40 1694019182 1694019203 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-036b2877ddeaea838-all",
"sensitivity": "normal",
"serverport": 5985,
"sourceinfo": "unknown",
"starttimeutc": "1694019182",
"tags": [
"621470537179",
"eni-036b2877ddeaea838",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "17.152.193.105",
"serverIP": "174.108.222.63"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-036b2877ddeaea838 17.152.193.105 174.108.222.63 33224 5985 6 1 40 1694019182 1694019203 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-036b2877ddeaea838 17.152.193.105 174.108.222.63 33224 5985 6 1 40 1694019182 1694019203 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 33224
endtimeutc: 1694019203
messagetype: network_flow_data
protocol: 6
senderhost: eni-036b2877ddeaea838-all
sensitivity: normal
serverport: 5985
sourceinfo: unknown
starttimeutc: 1694019182
tags: ['621470537179', 'eni-036b2877ddeaea838', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 17.152.193.105
serverIP: 174.108.222.63
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.