input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:210.46.111.94/39559 dst DMZ:158.165.71.252/9200 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 39559 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9200 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 210.46.111.94 serverIP: 158.165.71.252
Explain this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 39559, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 9200, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "148.52.145.240", "serverIP": "218.95.34.156" }
Create a JSON artifact from the message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:148.52.145.240/39559 dst DMZ:218.95.34.156/9200 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 39559 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9200 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 148.52.145.240 serverIP: 218.95.34.156
Explain this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 39559, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 9200, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "114.158.7.216", "serverIP": "58.242.229.20" }
Create a JSON artifact from the message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:114.158.7.216/39559 dst DMZ:58.242.229.20/9200 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 39559 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9200 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 114.158.7.216 serverIP: 58.242.229.20
Explain this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 39559, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 9200, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "197.43.142.111", "serverIP": "140.250.57.71" }
Create a JSON artifact from the message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Aug 03 2023 01:25:29: %ASA-4-106023: Deny tcp src outside:197.43.142.111/39559 dst DMZ:140.250.57.71/9200 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 39559 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9200 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 197.43.142.111 serverIP: 140.250.57.71
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "162.220.41.82", "serverIP": "45.180.198.130" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:162.220.41.82/42769 dst DMZ:45.180.198.130/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 162.220.41.82 serverIP: 45.180.198.130
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "188.220.5.229", "serverIP": "229.129.169.146" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:188.220.5.229/42769 dst DMZ:229.129.169.146/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 188.220.5.229 serverIP: 229.129.169.146
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "13.9.0.227", "serverIP": "121.2.209.161" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:13.9.0.227/33883 dst DMZ:121.2.209.161/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 13.9.0.227 serverIP: 121.2.209.161
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "38.92.161.164", "serverIP": "182.163.162.136" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:38.92.161.164/42769 dst DMZ:182.163.162.136/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 38.92.161.164 serverIP: 182.163.162.136
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "71.59.8.195", "serverIP": "233.150.153.220" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:71.59.8.195/33883 dst DMZ:233.150.153.220/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 71.59.8.195 serverIP: 233.150.153.220
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "8.6.43.35", "serverIP": "173.53.250.110" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:8.6.43.35/42769 dst DMZ:173.53.250.110/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 8.6.43.35 serverIP: 173.53.250.110
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "224.15.251.252", "serverIP": "228.215.210.189" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:224.15.251.252/33883 dst DMZ:228.215.210.189/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 224.15.251.252 serverIP: 228.215.210.189
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "73.130.54.47", "serverIP": "194.46.216.111" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:73.130.54.47/42769 dst DMZ:194.46.216.111/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 73.130.54.47 serverIP: 194.46.216.111
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "19.90.130.183", "serverIP": "163.130.207.199" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:19.90.130.183/33883 dst DMZ:163.130.207.199/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 19.90.130.183 serverIP: 163.130.207.199
Explain this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 42769, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2222, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "207.186.35.161", "serverIP": "203.244.20.172" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:18: %ASA-4-106023: Deny tcp src outside:207.186.35.161/42769 dst DMZ:203.244.20.172/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 42769 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2222 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 207.186.35.161 serverIP: 203.244.20.172
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "156.18.134.158", "serverIP": "135.237.20.203" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:156.18.134.158/33883 dst DMZ:135.237.20.203/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 156.18.134.158 serverIP: 135.237.20.203
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 33883, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 7547, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "28.147.8.76", "serverIP": "254.181.109.27" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:28.147.8.76/33883 dst DMZ:254.181.109.27/7547 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 33883 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 7547 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 28.147.8.76 serverIP: 254.181.109.27
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55416, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2480, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "22.49.195.112", "serverIP": "93.129.41.237" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:22.49.195.112/55416 dst DMZ:93.129.41.237/2480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55416 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2480 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 22.49.195.112 serverIP: 93.129.41.237
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55416, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2480, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "52.58.4.60", "serverIP": "216.188.196.252" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:52.58.4.60/55416 dst DMZ:216.188.196.252/2480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55416 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2480 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 52.58.4.60 serverIP: 216.188.196.252
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55416, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2480, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "196.47.89.107", "serverIP": "112.95.211.193" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:196.47.89.107/55416 dst DMZ:112.95.211.193/2480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55416 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2480 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 196.47.89.107 serverIP: 112.95.211.193
Explain this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 55416, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 2480, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "165.3.190.109", "serverIP": "47.246.218.32" }
Create a JSON artifact from the message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>Jun 08 2024 06:17:17: %ASA-4-106023: Deny tcp src outside:165.3.190.109/55416 dst DMZ:47.246.218.32/2480 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 55416 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 2480 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 165.3.190.109 serverIP: 47.246.218.32
Explain this syslog message
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
{ "action": "block", "clientport": 56441, "endtimeutc": "1709751577", "message": "2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0175d193bf030bd5c-all", "sensitivity": "normal", "serverport": 802, "sourceinfo": "unknown", "starttimeutc": "1709751546", "tags": [ "621470537179", "eni-0175d193bf030bd5c", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "49.218.0.243", "serverIP": "211.184.222.229" }
Create a JSON artifact from the message
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0175d193bf030bd5c 49.218.0.243 211.184.222.229 56441 802 6 1 44 1709751546 1709751577 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 56441 endtimeutc: 1709751577 messagetype: network_flow_data protocol: 6 senderhost: eni-0175d193bf030bd5c-all sensitivity: normal serverport: 802 sourceinfo: unknown starttimeutc: 1709751546 tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 49.218.0.243 serverIP: 211.184.222.229
Explain this syslog message
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
{ "action": "block", "clientport": 50370, "endtimeutc": "1709751577", "message": "2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0175d193bf030bd5c-all", "sensitivity": "normal", "serverport": 8883, "sourceinfo": "unknown", "starttimeutc": "1709751546", "tags": [ "621470537179", "eni-0175d193bf030bd5c", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "79.104.68.182", "serverIP": "106.116.251.194" }
Create a JSON artifact from the message
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0175d193bf030bd5c 79.104.68.182 106.116.251.194 50370 8883 6 1 44 1709751546 1709751577 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 50370 endtimeutc: 1709751577 messagetype: network_flow_data protocol: 6 senderhost: eni-0175d193bf030bd5c-all sensitivity: normal serverport: 8883 sourceinfo: unknown starttimeutc: 1709751546 tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 79.104.68.182 serverIP: 106.116.251.194
Explain this syslog message
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
{ "action": "block", "clientport": 51701, "endtimeutc": "1709751577", "message": "2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0175d193bf030bd5c-all", "sensitivity": "normal", "serverport": 8899, "sourceinfo": "unknown", "starttimeutc": "1709751546", "tags": [ "621470537179", "eni-0175d193bf030bd5c", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "24.218.197.30", "serverIP": "102.220.20.210" }
Create a JSON artifact from the message
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0175d193bf030bd5c 24.218.197.30 102.220.20.210 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 51701 endtimeutc: 1709751577 messagetype: network_flow_data protocol: 6 senderhost: eni-0175d193bf030bd5c-all sensitivity: normal serverport: 8899 sourceinfo: unknown starttimeutc: 1709751546 tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 24.218.197.30 serverIP: 102.220.20.210
Explain this syslog message
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
{ "action": "block", "clientport": 51701, "endtimeutc": "1709751577", "message": "2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0175d193bf030bd5c-all", "sensitivity": "normal", "serverport": 8899, "sourceinfo": "unknown", "starttimeutc": "1709751546", "tags": [ "621470537179", "eni-0175d193bf030bd5c", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "187.224.105.103", "serverIP": "234.65.99.34" }
Create a JSON artifact from the message
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0175d193bf030bd5c 187.224.105.103 234.65.99.34 51701 8899 6 1 44 1709751546 1709751577 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 51701 endtimeutc: 1709751577 messagetype: network_flow_data protocol: 6 senderhost: eni-0175d193bf030bd5c-all sensitivity: normal serverport: 8899 sourceinfo: unknown starttimeutc: 1709751546 tags: ['621470537179', 'eni-0175d193bf030bd5c', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 187.224.105.103 serverIP: 234.65.99.34
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
{ "action": "block", "clientport": 51568, "endtimeutc": "1709751335", "message": "2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 9689, "sourceinfo": "unknown", "starttimeutc": "1709751307", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "190.39.150.56", "serverIP": "31.167.90.218" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 190.39.150.56 31.167.90.218 51568 9689 6 1 44 1709751307 1709751335 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 51568 endtimeutc: 1709751335 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 9689 sourceinfo: unknown starttimeutc: 1709751307 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 190.39.150.56 serverIP: 31.167.90.218
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
{ "action": "block", "clientport": 46421, "endtimeutc": "1709751606", "message": "2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 348, "sourceinfo": "unknown", "starttimeutc": "1709751577", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 40, "streamName": "aws_vpc_flow_log", "clientIP": "74.252.192.98", "serverIP": "103.248.195.90" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 74.252.192.98 103.248.195.90 46421 348 6 1 40 1709751577 1709751606 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 46421 endtimeutc: 1709751606 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 348 sourceinfo: unknown starttimeutc: 1709751577 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 40 streamName: aws_vpc_flow_log clientIP: 74.252.192.98 serverIP: 103.248.195.90
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
{ "action": "block", "clientport": 41872, "endtimeutc": "1709751563", "message": "2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 1318, "sourceinfo": "unknown", "starttimeutc": "1709751549", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 40, "streamName": "aws_vpc_flow_log", "clientIP": "61.127.28.38", "serverIP": "156.156.123.18" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 61.127.28.38 156.156.123.18 41872 1318 6 1 40 1709751549 1709751563 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 41872 endtimeutc: 1709751563 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 1318 sourceinfo: unknown starttimeutc: 1709751549 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 40 streamName: aws_vpc_flow_log clientIP: 61.127.28.38 serverIP: 156.156.123.18
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
{ "action": "block", "clientport": 52227, "endtimeutc": "1709751535", "message": "2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 280, "sourceinfo": "unknown", "starttimeutc": "1709751515", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "188.206.56.169", "serverIP": "147.98.120.24" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 188.206.56.169 147.98.120.24 52227 280 6 1 44 1709751515 1709751535 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 52227 endtimeutc: 1709751535 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 280 sourceinfo: unknown starttimeutc: 1709751515 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 188.206.56.169 serverIP: 147.98.120.24
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
{ "action": "block", "clientport": 52845, "endtimeutc": "1709751502", "message": "2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 48145, "sourceinfo": "unknown", "starttimeutc": "1709751490", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "242.246.236.205", "serverIP": "118.88.75.58" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 242.246.236.205 118.88.75.58 52845 48145 6 1 44 1709751490 1709751502 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 52845 endtimeutc: 1709751502 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 48145 sourceinfo: unknown starttimeutc: 1709751490 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 242.246.236.205 serverIP: 118.88.75.58
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
{ "action": "block", "clientport": 51005, "endtimeutc": "1709751502", "message": "2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 44263, "sourceinfo": "unknown", "starttimeutc": "1709751490", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 60, "streamName": "aws_vpc_flow_log", "clientIP": "79.29.46.139", "serverIP": "122.183.151.240" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 122.183.151.240 79.29.46.139 44263 51005 6 1 60 1709751490 1709751502 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 51005 endtimeutc: 1709751502 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 44263 sourceinfo: unknown starttimeutc: 1709751490 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 60 streamName: aws_vpc_flow_log clientIP: 79.29.46.139 serverIP: 122.183.151.240
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
{ "action": "block", "clientport": 50687, "endtimeutc": "1709751502", "message": "2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 11495, "sourceinfo": "unknown", "starttimeutc": "1709751490", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "44.234.178.15", "serverIP": "10.137.109.163" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 44.234.178.15 10.137.109.163 50687 11495 6 1 44 1709751490 1709751502 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 50687 endtimeutc: 1709751502 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 11495 sourceinfo: unknown starttimeutc: 1709751490 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 44.234.178.15 serverIP: 10.137.109.163
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
{ "action": "block", "clientport": 54202, "endtimeutc": "1709751486", "message": "2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 9116, "sourceinfo": "unknown", "starttimeutc": "1709751465", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "20.120.101.135", "serverIP": "80.186.43.122" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 20.120.101.135 80.186.43.122 54202 9116 6 1 44 1709751465 1709751486 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 54202 endtimeutc: 1709751486 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 9116 sourceinfo: unknown starttimeutc: 1709751465 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 20.120.101.135 serverIP: 80.186.43.122
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
{ "action": "block", "clientport": 55256, "endtimeutc": "1709751445", "message": "2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 34437, "sourceinfo": "unknown", "starttimeutc": "1709751437", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "96.157.67.175", "serverIP": "179.162.85.64" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message
2 621470537179 eni-0254f65e76d3a1b69 96.157.67.175 179.162.85.64 55256 34437 6 1 44 1709751437 1709751445 REJECT OK
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message: action: block clientport: 55256 endtimeutc: 1709751445 messagetype: network_flow_data protocol: 6 senderhost: eni-0254f65e76d3a1b69-all sensitivity: normal serverport: 34437 sourceinfo: unknown starttimeutc: 1709751437 tags: ['621470537179', 'eni-0254f65e76d3a1b69', 'aws_vpc_flow_log', 'network_flow_data'] totalbytes: 44 streamName: aws_vpc_flow_log clientIP: 96.157.67.175 serverIP: 179.162.85.64
Explain this syslog message
2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK
{ "action": "block", "clientport": 54453, "endtimeutc": "1709751424", "message": "2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK", "messagetype": "network_flow_data", "protocol": 6, "senderhost": "eni-0254f65e76d3a1b69-all", "sensitivity": "normal", "serverport": 4343, "sourceinfo": "unknown", "starttimeutc": "1709751398", "tags": [ "621470537179", "eni-0254f65e76d3a1b69", "aws_vpc_flow_log", "network_flow_data" ], "totalbytes": 44, "streamName": "aws_vpc_flow_log", "clientIP": "34.112.236.5", "serverIP": "183.19.151.222" }
Create a JSON artifact from the message
2 621470537179 eni-0254f65e76d3a1b69 34.112.236.5 183.19.151.222 54453 4343 6 1 44 1709751398 1709751424 REJECT OK
Product: AWS VPC Security Vendor: Amazon Web Services
Identify this syslog message