input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 39559
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9200
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 210.46.111.94
serverIP: 158.165.71.252
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 39559,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9200,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "148.52.145.240",
"serverIP": "218.95.34.156"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 39559
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9200
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 148.52.145.240
serverIP: 218.95.34.156
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 39559,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9200,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "114.158.7.216",
"serverIP": "58.242.229.20"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 39559
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9200
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 114.158.7.216
serverIP: 58.242.229.20
|
Explain this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 39559,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9200,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "197.43.142.111",
"serverIP": "140.250.57.71"
}
|
Create a JSON artifact from the message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 39559
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9200
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 197.43.142.111
serverIP: 140.250.57.71
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "162.220.41.82",
"serverIP": "45.180.198.130"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 162.220.41.82
serverIP: 45.180.198.130
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "188.220.5.229",
"serverIP": "229.129.169.146"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 188.220.5.229
serverIP: 229.129.169.146
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "13.9.0.227",
"serverIP": "121.2.209.161"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 13.9.0.227
serverIP: 121.2.209.161
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "38.92.161.164",
"serverIP": "182.163.162.136"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 38.92.161.164
serverIP: 182.163.162.136
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "71.59.8.195",
"serverIP": "233.150.153.220"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 71.59.8.195
serverIP: 233.150.153.220
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "8.6.43.35",
"serverIP": "173.53.250.110"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 8.6.43.35
serverIP: 173.53.250.110
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "224.15.251.252",
"serverIP": "228.215.210.189"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 224.15.251.252
serverIP: 228.215.210.189
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "73.130.54.47",
"serverIP": "194.46.216.111"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 73.130.54.47
serverIP: 194.46.216.111
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "19.90.130.183",
"serverIP": "163.130.207.199"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 19.90.130.183
serverIP: 163.130.207.199
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 42769,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2222,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "207.186.35.161",
"serverIP": "203.244.20.172"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 42769
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2222
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 207.186.35.161
serverIP: 203.244.20.172
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "156.18.134.158",
"serverIP": "135.237.20.203"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 156.18.134.158
serverIP: 135.237.20.203
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 33883,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 7547,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "28.147.8.76",
"serverIP": "254.181.109.27"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 33883
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 7547
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 28.147.8.76
serverIP: 254.181.109.27
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55416,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2480,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "22.49.195.112",
"serverIP": "93.129.41.237"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55416
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2480
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 22.49.195.112
serverIP: 93.129.41.237
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55416,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2480,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "52.58.4.60",
"serverIP": "216.188.196.252"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55416
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2480
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 52.58.4.60
serverIP: 216.188.196.252
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55416,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2480,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "196.47.89.107",
"serverIP": "112.95.211.193"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55416
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2480
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 196.47.89.107
serverIP: 112.95.211.193
|
Explain this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 55416,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 2480,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "165.3.190.109",
"serverIP": "47.246.218.32"
}
|
Create a JSON artifact from the message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 55416
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 2480
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 165.3.190.109
serverIP: 47.246.218.32
|
Explain this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
|
{
"action": "block",
"clientport": 56441,
"endtimeutc": "1709751577",
"message": "2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0175d193bf030bd5c-all",
"sensitivity": "normal",
"serverport": 802,
"sourceinfo": "unknown",
"starttimeutc": "1709751546",
"tags": [
"621470537179",
"eni-0175d193bf030bd5c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "49.218.0.243",
"serverIP": "211.184.222.229"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 56441
endtimeutc: 1709751577
messagetype: network_flow_data
protocol: 6
senderhost: eni-0175d193bf030bd5c-all
sensitivity: normal
serverport: 802
sourceinfo: unknown
starttimeutc: 1709751546
tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 49.218.0.243
serverIP: 211.184.222.229
|
Explain this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
|
{
"action": "block",
"clientport": 50370,
"endtimeutc": "1709751577",
"message": "2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0175d193bf030bd5c-all",
"sensitivity": "normal",
"serverport": 8883,
"sourceinfo": "unknown",
"starttimeutc": "1709751546",
"tags": [
"621470537179",
"eni-0175d193bf030bd5c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "79.104.68.182",
"serverIP": "106.116.251.194"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 50370
endtimeutc: 1709751577
messagetype: network_flow_data
protocol: 6
senderhost: eni-0175d193bf030bd5c-all
sensitivity: normal
serverport: 8883
sourceinfo: unknown
starttimeutc: 1709751546
tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 79.104.68.182
serverIP: 106.116.251.194
|
Explain this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
{
"action": "block",
"clientport": 51701,
"endtimeutc": "1709751577",
"message": "2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0175d193bf030bd5c-all",
"sensitivity": "normal",
"serverport": 8899,
"sourceinfo": "unknown",
"starttimeutc": "1709751546",
"tags": [
"621470537179",
"eni-0175d193bf030bd5c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "24.218.197.30",
"serverIP": "102.220.20.210"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 51701
endtimeutc: 1709751577
messagetype: network_flow_data
protocol: 6
senderhost: eni-0175d193bf030bd5c-all
sensitivity: normal
serverport: 8899
sourceinfo: unknown
starttimeutc: 1709751546
tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 24.218.197.30
serverIP: 102.220.20.210
|
Explain this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
{
"action": "block",
"clientport": 51701,
"endtimeutc": "1709751577",
"message": "2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0175d193bf030bd5c-all",
"sensitivity": "normal",
"serverport": 8899,
"sourceinfo": "unknown",
"starttimeutc": "1709751546",
"tags": [
"621470537179",
"eni-0175d193bf030bd5c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "187.224.105.103",
"serverIP": "234.65.99.34"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 51701
endtimeutc: 1709751577
messagetype: network_flow_data
protocol: 6
senderhost: eni-0175d193bf030bd5c-all
sensitivity: normal
serverport: 8899
sourceinfo: unknown
starttimeutc: 1709751546
tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 187.224.105.103
serverIP: 234.65.99.34
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
|
{
"action": "block",
"clientport": 51568,
"endtimeutc": "1709751335",
"message": "2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 9689,
"sourceinfo": "unknown",
"starttimeutc": "1709751307",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "190.39.150.56",
"serverIP": "31.167.90.218"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 51568
endtimeutc: 1709751335
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 9689
sourceinfo: unknown
starttimeutc: 1709751307
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 190.39.150.56
serverIP: 31.167.90.218
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
|
{
"action": "block",
"clientport": 46421,
"endtimeutc": "1709751606",
"message": "2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 348,
"sourceinfo": "unknown",
"starttimeutc": "1709751577",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "74.252.192.98",
"serverIP": "103.248.195.90"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 46421
endtimeutc: 1709751606
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 348
sourceinfo: unknown
starttimeutc: 1709751577
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 74.252.192.98
serverIP: 103.248.195.90
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
|
{
"action": "block",
"clientport": 41872,
"endtimeutc": "1709751563",
"message": "2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 1318,
"sourceinfo": "unknown",
"starttimeutc": "1709751549",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "61.127.28.38",
"serverIP": "156.156.123.18"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 41872
endtimeutc: 1709751563
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 1318
sourceinfo: unknown
starttimeutc: 1709751549
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 61.127.28.38
serverIP: 156.156.123.18
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
|
{
"action": "block",
"clientport": 52227,
"endtimeutc": "1709751535",
"message": "2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 280,
"sourceinfo": "unknown",
"starttimeutc": "1709751515",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "188.206.56.169",
"serverIP": "147.98.120.24"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 52227
endtimeutc: 1709751535
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 280
sourceinfo: unknown
starttimeutc: 1709751515
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 188.206.56.169
serverIP: 147.98.120.24
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
|
{
"action": "block",
"clientport": 52845,
"endtimeutc": "1709751502",
"message": "2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 48145,
"sourceinfo": "unknown",
"starttimeutc": "1709751490",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "242.246.236.205",
"serverIP": "118.88.75.58"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 52845
endtimeutc: 1709751502
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 48145
sourceinfo: unknown
starttimeutc: 1709751490
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 242.246.236.205
serverIP: 118.88.75.58
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
|
{
"action": "block",
"clientport": 51005,
"endtimeutc": "1709751502",
"message": "2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 44263,
"sourceinfo": "unknown",
"starttimeutc": "1709751490",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 60,
"streamName": "aws_vpc_flow_log",
"clientIP": "79.29.46.139",
"serverIP": "122.183.151.240"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 51005
endtimeutc: 1709751502
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 44263
sourceinfo: unknown
starttimeutc: 1709751490
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 60
streamName: aws_vpc_flow_log
clientIP: 79.29.46.139
serverIP: 122.183.151.240
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
|
{
"action": "block",
"clientport": 50687,
"endtimeutc": "1709751502",
"message": "2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 11495,
"sourceinfo": "unknown",
"starttimeutc": "1709751490",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "44.234.178.15",
"serverIP": "10.137.109.163"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 50687
endtimeutc: 1709751502
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 11495
sourceinfo: unknown
starttimeutc: 1709751490
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 44.234.178.15
serverIP: 10.137.109.163
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
|
{
"action": "block",
"clientport": 54202,
"endtimeutc": "1709751486",
"message": "2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 9116,
"sourceinfo": "unknown",
"starttimeutc": "1709751465",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "20.120.101.135",
"serverIP": "80.186.43.122"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 54202
endtimeutc: 1709751486
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 9116
sourceinfo: unknown
starttimeutc: 1709751465
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 20.120.101.135
serverIP: 80.186.43.122
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
|
{
"action": "block",
"clientport": 55256,
"endtimeutc": "1709751445",
"message": "2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 34437,
"sourceinfo": "unknown",
"starttimeutc": "1709751437",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "96.157.67.175",
"serverIP": "179.162.85.64"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 55256
endtimeutc: 1709751445
messagetype: network_flow_data
protocol: 6
senderhost: eni-0254f65e76d3a1b69-all
sensitivity: normal
serverport: 34437
sourceinfo: unknown
starttimeutc: 1709751437
tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 96.157.67.175
serverIP: 179.162.85.64
|
Explain this syslog message
|
2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK
|
{
"action": "block",
"clientport": 54453,
"endtimeutc": "1709751424",
"message": "2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-0254f65e76d3a1b69-all",
"sensitivity": "normal",
"serverport": 4343,
"sourceinfo": "unknown",
"starttimeutc": "1709751398",
"tags": [
"621470537179",
"eni-0254f65e76d3a1b69",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "34.112.236.5",
"serverIP": "183.19.151.222"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.