input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
2 621470537179 eni-0ad74816c12ad8def 89.144.71.115 58.186.229.217 53455 90 6 1 44 1694019090 1694019110 REJECT OK
|
{
"action": "block",
"clientport": 53455,
"endtimeutc": "1694019110",
"message": "2 621470537179 eni-0ad74816c12ad8def 89.144.71.115 58.186.229.217 53455 90 6 1 44 1694019090 1694019110 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 90,
"sourceinfo": "unknown",
"starttimeutc": "1694019090",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "89.144.71.115",
"serverIP": "58.186.229.217"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 89.144.71.115 58.186.229.217 53455 90 6 1 44 1694019090 1694019110 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 89.144.71.115 58.186.229.217 53455 90 6 1 44 1694019090 1694019110 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 53455
endtimeutc: 1694019110
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 90
sourceinfo: unknown
starttimeutc: 1694019090
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 89.144.71.115
serverIP: 58.186.229.217
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 149.144.25.251 24.132.230.29 41469 41198 6 1 40 1694019114 1694019133 REJECT OK
|
{
"action": "block",
"clientport": 41469,
"endtimeutc": "1694019133",
"message": "2 621470537179 eni-0ad74816c12ad8def 149.144.25.251 24.132.230.29 41469 41198 6 1 40 1694019114 1694019133 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 41198,
"sourceinfo": "unknown",
"starttimeutc": "1694019114",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "149.144.25.251",
"serverIP": "24.132.230.29"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 149.144.25.251 24.132.230.29 41469 41198 6 1 40 1694019114 1694019133 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 149.144.25.251 24.132.230.29 41469 41198 6 1 40 1694019114 1694019133 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 41469
endtimeutc: 1694019133
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 41198
sourceinfo: unknown
starttimeutc: 1694019114
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 149.144.25.251
serverIP: 24.132.230.29
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 42.205.131.228 240.66.252.2 45442 8137 6 1 40 1694019090 1694019110 REJECT OK
|
{
"action": "block",
"clientport": 45442,
"endtimeutc": "1694019110",
"message": "2 621470537179 eni-0ad74816c12ad8def 42.205.131.228 240.66.252.2 45442 8137 6 1 40 1694019090 1694019110 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 8137,
"sourceinfo": "unknown",
"starttimeutc": "1694019090",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "42.205.131.228",
"serverIP": "240.66.252.2"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 42.205.131.228 240.66.252.2 45442 8137 6 1 40 1694019090 1694019110 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 42.205.131.228 240.66.252.2 45442 8137 6 1 40 1694019090 1694019110 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 45442
endtimeutc: 1694019110
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 8137
sourceinfo: unknown
starttimeutc: 1694019090
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 42.205.131.228
serverIP: 240.66.252.2
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 69.25.23.10 231.205.19.17 41211 3380 6 1 40 1694019114 1694019133 REJECT OK
|
{
"action": "block",
"clientport": 41211,
"endtimeutc": "1694019133",
"message": "2 621470537179 eni-0ad74816c12ad8def 69.25.23.10 231.205.19.17 41211 3380 6 1 40 1694019114 1694019133 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 3380,
"sourceinfo": "unknown",
"starttimeutc": "1694019114",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "69.25.23.10",
"serverIP": "231.205.19.17"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 69.25.23.10 231.205.19.17 41211 3380 6 1 40 1694019114 1694019133 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 69.25.23.10 231.205.19.17 41211 3380 6 1 40 1694019114 1694019133 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 41211
endtimeutc: 1694019133
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 3380
sourceinfo: unknown
starttimeutc: 1694019114
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 69.25.23.10
serverIP: 231.205.19.17
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 120.43.10.108 196.209.38.74 56713 6945 6 1 40 1694019090 1694019110 REJECT OK
|
{
"action": "block",
"clientport": 56713,
"endtimeutc": "1694019110",
"message": "2 621470537179 eni-0ad74816c12ad8def 120.43.10.108 196.209.38.74 56713 6945 6 1 40 1694019090 1694019110 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 6945,
"sourceinfo": "unknown",
"starttimeutc": "1694019090",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "120.43.10.108",
"serverIP": "196.209.38.74"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 120.43.10.108 196.209.38.74 56713 6945 6 1 40 1694019090 1694019110 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 120.43.10.108 196.209.38.74 56713 6945 6 1 40 1694019090 1694019110 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 56713
endtimeutc: 1694019110
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 6945
sourceinfo: unknown
starttimeutc: 1694019090
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 120.43.10.108
serverIP: 196.209.38.74
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 110.211.69.103 86.79.212.88 53765 10013 6 1 44 1694019025 1694019046 REJECT OK
|
{
"action": "block",
"clientport": 53765,
"endtimeutc": "1694019046",
"message": "2 621470537179 eni-0ad74816c12ad8def 110.211.69.103 86.79.212.88 53765 10013 6 1 44 1694019025 1694019046 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 10013,
"sourceinfo": "unknown",
"starttimeutc": "1694019025",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "110.211.69.103",
"serverIP": "86.79.212.88"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 110.211.69.103 86.79.212.88 53765 10013 6 1 44 1694019025 1694019046 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 110.211.69.103 86.79.212.88 53765 10013 6 1 44 1694019025 1694019046 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 53765
endtimeutc: 1694019046
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 10013
sourceinfo: unknown
starttimeutc: 1694019025
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 110.211.69.103
serverIP: 86.79.212.88
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 171.203.205.17 189.22.212.139 40956 9111 6 1 44 1694019054 1694019072 REJECT OK
|
{
"action": "block",
"clientport": 40956,
"endtimeutc": "1694019072",
"message": "2 621470537179 eni-0ad74816c12ad8def 171.203.205.17 189.22.212.139 40956 9111 6 1 44 1694019054 1694019072 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 9111,
"sourceinfo": "unknown",
"starttimeutc": "1694019054",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "171.203.205.17",
"serverIP": "189.22.212.139"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 171.203.205.17 189.22.212.139 40956 9111 6 1 44 1694019054 1694019072 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 171.203.205.17 189.22.212.139 40956 9111 6 1 44 1694019054 1694019072 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 40956
endtimeutc: 1694019072
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 9111
sourceinfo: unknown
starttimeutc: 1694019054
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 171.203.205.17
serverIP: 189.22.212.139
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 46.88.70.49 44.19.166.108 10647 9055 6 1 44 1694019013 1694019023 REJECT OK
|
{
"action": "block",
"clientport": 10647,
"endtimeutc": "1694019023",
"message": "2 621470537179 eni-0ad74816c12ad8def 46.88.70.49 44.19.166.108 10647 9055 6 1 44 1694019013 1694019023 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 9055,
"sourceinfo": "unknown",
"starttimeutc": "1694019013",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "46.88.70.49",
"serverIP": "44.19.166.108"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 46.88.70.49 44.19.166.108 10647 9055 6 1 44 1694019013 1694019023 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 46.88.70.49 44.19.166.108 10647 9055 6 1 44 1694019013 1694019023 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 10647
endtimeutc: 1694019023
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 9055
sourceinfo: unknown
starttimeutc: 1694019013
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 46.88.70.49
serverIP: 44.19.166.108
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 133.255.127.101 159.72.6.53 57573 5934 6 1 40 1694019025 1694019046 REJECT OK
|
{
"action": "block",
"clientport": 57573,
"endtimeutc": "1694019046",
"message": "2 621470537179 eni-0ad74816c12ad8def 133.255.127.101 159.72.6.53 57573 5934 6 1 40 1694019025 1694019046 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 5934,
"sourceinfo": "unknown",
"starttimeutc": "1694019025",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "133.255.127.101",
"serverIP": "159.72.6.53"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 133.255.127.101 159.72.6.53 57573 5934 6 1 40 1694019025 1694019046 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 133.255.127.101 159.72.6.53 57573 5934 6 1 40 1694019025 1694019046 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 57573
endtimeutc: 1694019046
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 5934
sourceinfo: unknown
starttimeutc: 1694019025
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 133.255.127.101
serverIP: 159.72.6.53
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 253.151.131.252 146.79.183.206 46044 54974 6 1 40 1694019013 1694019023 REJECT OK
|
{
"action": "block",
"clientport": 54974,
"endtimeutc": "1694019023",
"message": "2 621470537179 eni-0ad74816c12ad8def 253.151.131.252 146.79.183.206 46044 54974 6 1 40 1694019013 1694019023 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 46044,
"sourceinfo": "unknown",
"starttimeutc": "1694019013",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "146.79.183.206",
"serverIP": "253.151.131.252"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 253.151.131.252 146.79.183.206 46044 54974 6 1 40 1694019013 1694019023 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 253.151.131.252 146.79.183.206 46044 54974 6 1 40 1694019013 1694019023 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 54974
endtimeutc: 1694019023
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 46044
sourceinfo: unknown
starttimeutc: 1694019013
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 146.79.183.206
serverIP: 253.151.131.252
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 202.16.34.99 77.199.184.73 44119 7210 6 1 40 1694019013 1694019023 REJECT OK
|
{
"action": "block",
"clientport": 44119,
"endtimeutc": "1694019023",
"message": "2 621470537179 eni-0ad74816c12ad8def 202.16.34.99 77.199.184.73 44119 7210 6 1 40 1694019013 1694019023 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 7210,
"sourceinfo": "unknown",
"starttimeutc": "1694019013",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "202.16.34.99",
"serverIP": "77.199.184.73"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 202.16.34.99 77.199.184.73 44119 7210 6 1 40 1694019013 1694019023 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 202.16.34.99 77.199.184.73 44119 7210 6 1 40 1694019013 1694019023 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 44119
endtimeutc: 1694019023
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 7210
sourceinfo: unknown
starttimeutc: 1694019013
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 202.16.34.99
serverIP: 77.199.184.73
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 129.132.210.184 250.20.18.253 54465 2974 6 1 40 1694019054 1694019072 REJECT OK
|
{
"action": "block",
"clientport": 54465,
"endtimeutc": "1694019072",
"message": "2 621470537179 eni-0ad74816c12ad8def 129.132.210.184 250.20.18.253 54465 2974 6 1 40 1694019054 1694019072 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 2974,
"sourceinfo": "unknown",
"starttimeutc": "1694019054",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "129.132.210.184",
"serverIP": "250.20.18.253"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 129.132.210.184 250.20.18.253 54465 2974 6 1 40 1694019054 1694019072 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 129.132.210.184 250.20.18.253 54465 2974 6 1 40 1694019054 1694019072 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 54465
endtimeutc: 1694019072
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 2974
sourceinfo: unknown
starttimeutc: 1694019054
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 129.132.210.184
serverIP: 250.20.18.253
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 97.91.175.201 211.188.1.82 63638 32771 6 1 40 1694019054 1694019072 REJECT OK
|
{
"action": "block",
"clientport": 63638,
"endtimeutc": "1694019072",
"message": "2 621470537179 eni-0ad74816c12ad8def 97.91.175.201 211.188.1.82 63638 32771 6 1 40 1694019054 1694019072 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 32771,
"sourceinfo": "unknown",
"starttimeutc": "1694019054",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "97.91.175.201",
"serverIP": "211.188.1.82"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 97.91.175.201 211.188.1.82 63638 32771 6 1 40 1694019054 1694019072 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 97.91.175.201 211.188.1.82 63638 32771 6 1 40 1694019054 1694019072 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 63638
endtimeutc: 1694019072
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 32771
sourceinfo: unknown
starttimeutc: 1694019054
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 97.91.175.201
serverIP: 211.188.1.82
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 247.232.40.27 103.187.43.251 58187 25044 6 1 40 1694019013 1694019023 REJECT OK
|
{
"action": "block",
"clientport": 58187,
"endtimeutc": "1694019023",
"message": "2 621470537179 eni-0ad74816c12ad8def 247.232.40.27 103.187.43.251 58187 25044 6 1 40 1694019013 1694019023 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 25044,
"sourceinfo": "unknown",
"starttimeutc": "1694019013",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "247.232.40.27",
"serverIP": "103.187.43.251"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 247.232.40.27 103.187.43.251 58187 25044 6 1 40 1694019013 1694019023 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 247.232.40.27 103.187.43.251 58187 25044 6 1 40 1694019013 1694019023 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 58187
endtimeutc: 1694019023
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 25044
sourceinfo: unknown
starttimeutc: 1694019013
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 247.232.40.27
serverIP: 103.187.43.251
|
Explain this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 227.213.62.201 96.12.188.154 63638 49155 6 1 40 1694019054 1694019072 REJECT OK
|
{
"action": "block",
"clientport": 63638,
"endtimeutc": "1694019072",
"message": "2 621470537179 eni-0ad74816c12ad8def 227.213.62.201 96.12.188.154 63638 49155 6 1 40 1694019054 1694019072 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0ad74816c12ad8def-all",
"sensitivity": "normal",
"serverport": 49155,
"sourceinfo": "unknown",
"starttimeutc": "1694019054",
"tags": [
"621470537179",
"eni-0ad74816c12ad8def",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "227.213.62.201",
"serverIP": "96.12.188.154"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0ad74816c12ad8def 227.213.62.201 96.12.188.154 63638 49155 6 1 40 1694019054 1694019072 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0ad74816c12ad8def 227.213.62.201 96.12.188.154 63638 49155 6 1 40 1694019054 1694019072 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 63638
endtimeutc: 1694019072
messagetype: network_flow_data
protocol: 6
senderhost: eni-0ad74816c12ad8def-all
sensitivity: normal
serverport: 49155
sourceinfo: unknown
starttimeutc: 1694019054
tags: ['621470537179', 'eni-0ad74816c12ad8def', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 227.213.62.201
serverIP: 96.12.188.154
|
Explain this syslog message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:5.75.132.172/54366 dst DMZ:3.63.82.227/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 54366,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:5.75.132.172/54366 dst DMZ:3.63.82.227/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9001,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "5.75.132.172",
"serverIP": "3.63.82.227"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:5.75.132.172/54366 dst DMZ:3.63.82.227/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:5.75.132.172/54366 dst DMZ:3.63.82.227/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 54366
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9001
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 5.75.132.172
serverIP: 3.63.82.227
|
Explain this syslog message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:208.75.103.165/54366 dst DMZ:149.89.113.118/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 54366,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:208.75.103.165/54366 dst DMZ:149.89.113.118/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9001,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "208.75.103.165",
"serverIP": "149.89.113.118"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:208.75.103.165/54366 dst DMZ:149.89.113.118/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:56:43: %ASA-4-106023: Deny tcp src outside:208.75.103.165/54366 dst DMZ:149.89.113.118/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 54366
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9001
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 208.75.103.165
serverIP: 149.89.113.118
|
Explain this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:172.255.215.250/40696 dst DMZ:99.204.170.42/1388 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40696,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:172.255.215.250/40696 dst DMZ:99.204.170.42/1388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1388,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "172.255.215.250",
"serverIP": "99.204.170.42"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:172.255.215.250/40696 dst DMZ:99.204.170.42/1388 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:172.255.215.250/40696 dst DMZ:99.204.170.42/1388 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40696
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1388
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 172.255.215.250
serverIP: 99.204.170.42
|
Explain this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:66.214.124.203/40696 dst DMZ:166.108.236.152/1388 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40696,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:66.214.124.203/40696 dst DMZ:166.108.236.152/1388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1388,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "66.214.124.203",
"serverIP": "166.108.236.152"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:66.214.124.203/40696 dst DMZ:166.108.236.152/1388 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:66.214.124.203/40696 dst DMZ:166.108.236.152/1388 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40696
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1388
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 66.214.124.203
serverIP: 166.108.236.152
|
Explain this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:50.241.9.15/40696 dst DMZ:70.222.96.108/1388 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40696,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:50.241.9.15/40696 dst DMZ:70.222.96.108/1388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1388,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "50.241.9.15",
"serverIP": "70.222.96.108"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:50.241.9.15/40696 dst DMZ:70.222.96.108/1388 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:50.241.9.15/40696 dst DMZ:70.222.96.108/1388 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40696
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1388
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 50.241.9.15
serverIP: 70.222.96.108
|
Explain this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:27.215.254.29/40696 dst DMZ:87.228.135.238/1388 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 40696,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:27.215.254.29/40696 dst DMZ:87.228.135.238/1388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1388,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "27.215.254.29",
"serverIP": "87.228.135.238"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:27.215.254.29/40696 dst DMZ:87.228.135.238/1388 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 02:15:40: %ASA-4-106023: Deny tcp src outside:27.215.254.29/40696 dst DMZ:87.228.135.238/1388 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 40696
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1388
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 27.215.254.29
serverIP: 87.228.135.238
|
Explain this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:13.111.81.228/45660 dst DMZ:216.233.218.90/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45660,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:13.111.81.228/45660 dst DMZ:216.233.218.90/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "13.111.81.228",
"serverIP": "216.233.218.90"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:13.111.81.228/45660 dst DMZ:216.233.218.90/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:13.111.81.228/45660 dst DMZ:216.233.218.90/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45660
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 13.111.81.228
serverIP: 216.233.218.90
|
Explain this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:23.44.110.160/45660 dst DMZ:213.21.82.218/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45660,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:23.44.110.160/45660 dst DMZ:213.21.82.218/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "23.44.110.160",
"serverIP": "213.21.82.218"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:23.44.110.160/45660 dst DMZ:213.21.82.218/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:23.44.110.160/45660 dst DMZ:213.21.82.218/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45660
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 23.44.110.160
serverIP: 213.21.82.218
|
Explain this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:226.104.248.219/45660 dst DMZ:173.112.139.2/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45660,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:226.104.248.219/45660 dst DMZ:173.112.139.2/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "226.104.248.219",
"serverIP": "173.112.139.2"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:226.104.248.219/45660 dst DMZ:173.112.139.2/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:226.104.248.219/45660 dst DMZ:173.112.139.2/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45660
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 226.104.248.219
serverIP: 173.112.139.2
|
Explain this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:129.252.68.90/45660 dst DMZ:226.80.220.192/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45660,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:129.252.68.90/45660 dst DMZ:226.80.220.192/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "129.252.68.90",
"serverIP": "226.80.220.192"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:129.252.68.90/45660 dst DMZ:226.80.220.192/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 05:00:04: %ASA-4-106023: Deny tcp src outside:129.252.68.90/45660 dst DMZ:226.80.220.192/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45660
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 129.252.68.90
serverIP: 226.80.220.192
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:92.16.132.164/62467 dst DMZ:107.10.57.144/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:92.16.132.164/62467 dst DMZ:107.10.57.144/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "92.16.132.164",
"serverIP": "107.10.57.144"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:92.16.132.164/62467 dst DMZ:107.10.57.144/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:92.16.132.164/62467 dst DMZ:107.10.57.144/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 92.16.132.164
serverIP: 107.10.57.144
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:230.237.155.35/62467 dst DMZ:88.23.133.104/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:230.237.155.35/62467 dst DMZ:88.23.133.104/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "230.237.155.35",
"serverIP": "88.23.133.104"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:230.237.155.35/62467 dst DMZ:88.23.133.104/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:230.237.155.35/62467 dst DMZ:88.23.133.104/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 230.237.155.35
serverIP: 88.23.133.104
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:79.247.196.8/62467 dst DMZ:90.46.226.250/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:79.247.196.8/62467 dst DMZ:90.46.226.250/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "79.247.196.8",
"serverIP": "90.46.226.250"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:79.247.196.8/62467 dst DMZ:90.46.226.250/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:79.247.196.8/62467 dst DMZ:90.46.226.250/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 79.247.196.8
serverIP: 90.46.226.250
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:168.178.244.99/62467 dst DMZ:211.60.5.242/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:168.178.244.99/62467 dst DMZ:211.60.5.242/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "168.178.244.99",
"serverIP": "211.60.5.242"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:168.178.244.99/62467 dst DMZ:211.60.5.242/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:168.178.244.99/62467 dst DMZ:211.60.5.242/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 168.178.244.99
serverIP: 211.60.5.242
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:180.186.80.11/62467 dst DMZ:236.4.40.52/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:180.186.80.11/62467 dst DMZ:236.4.40.52/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "180.186.80.11",
"serverIP": "236.4.40.52"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:180.186.80.11/62467 dst DMZ:236.4.40.52/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:180.186.80.11/62467 dst DMZ:236.4.40.52/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 180.186.80.11
serverIP: 236.4.40.52
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:163.185.61.252/62467 dst DMZ:107.40.118.174/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:163.185.61.252/62467 dst DMZ:107.40.118.174/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "163.185.61.252",
"serverIP": "107.40.118.174"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:163.185.61.252/62467 dst DMZ:107.40.118.174/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:163.185.61.252/62467 dst DMZ:107.40.118.174/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 163.185.61.252
serverIP: 107.40.118.174
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:60.178.96.231/62467 dst DMZ:6.162.184.18/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:60.178.96.231/62467 dst DMZ:6.162.184.18/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "60.178.96.231",
"serverIP": "6.162.184.18"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:60.178.96.231/62467 dst DMZ:6.162.184.18/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:60.178.96.231/62467 dst DMZ:6.162.184.18/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 60.178.96.231
serverIP: 6.162.184.18
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:122.175.208.42/62467 dst DMZ:237.255.233.77/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 62467,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:122.175.208.42/62467 dst DMZ:237.255.233.77/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 445,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "122.175.208.42",
"serverIP": "237.255.233.77"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:122.175.208.42/62467 dst DMZ:237.255.233.77/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:30: %ASA-4-106023: Deny tcp src outside:122.175.208.42/62467 dst DMZ:237.255.233.77/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 62467
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 445
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 122.175.208.42
serverIP: 237.255.233.77
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 39559,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9200,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "210.46.111.94",
"serverIP": "158.165.71.252"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.