input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=211.78.92.171 1 1656855253.383053922 M24_MX67C_ForestPark flows src=19.243.66.50 dst=211.78.92.171 protocol=tcp sport=42035 dport=7913 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7913
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 19.243.66.50
serverIP: 211.78.92.171 | Explain this syslog message |
<134>Original Address=132.94.104.96 1 1656855253.383053922 M24_MX67C_ForestPark flows src=166.222.7.176 dst=132.94.104.96 protocol=tcp sport=42035 dport=7913 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7913,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=132.94.104.96 1 1656855253.383053922 M24_MX67C_ForestPark flows src=166.222.7.176 dst=132.94.104.96 protocol=tcp sport=42035 dport=7913 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "166.222.7.176",
"serverIP": "132.94.104.96"
} | Create a JSON artifact from the message |
<134>Original Address=132.94.104.96 1 1656855253.383053922 M24_MX67C_ForestPark flows src=166.222.7.176 dst=132.94.104.96 protocol=tcp sport=42035 dport=7913 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=132.94.104.96 1 1656855253.383053922 M24_MX67C_ForestPark flows src=166.222.7.176 dst=132.94.104.96 protocol=tcp sport=42035 dport=7913 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7913
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 166.222.7.176
serverIP: 132.94.104.96 | Explain this syslog message |
<134>Original Address=74.240.101.113 1 1656855253.383053922 M24_MX67C_ForestPark flows src=249.243.131.171 dst=74.240.101.113 protocol=tcp sport=42035 dport=7913 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7913,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.240.101.113 1 1656855253.383053922 M24_MX67C_ForestPark flows src=249.243.131.171 dst=74.240.101.113 protocol=tcp sport=42035 dport=7913 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "249.243.131.171",
"serverIP": "74.240.101.113"
} | Create a JSON artifact from the message |
<134>Original Address=74.240.101.113 1 1656855253.383053922 M24_MX67C_ForestPark flows src=249.243.131.171 dst=74.240.101.113 protocol=tcp sport=42035 dport=7913 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.240.101.113 1 1656855253.383053922 M24_MX67C_ForestPark flows src=249.243.131.171 dst=74.240.101.113 protocol=tcp sport=42035 dport=7913 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7913
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 249.243.131.171
serverIP: 74.240.101.113 | Explain this syslog message |
<134>Original Address=72.83.40.181 1 1656855253.383053922 M24_MX67C_ForestPark flows src=32.0.80.9 dst=72.83.40.181 protocol=tcp sport=42035 dport=7913 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7913,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=72.83.40.181 1 1656855253.383053922 M24_MX67C_ForestPark flows src=32.0.80.9 dst=72.83.40.181 protocol=tcp sport=42035 dport=7913 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.0.80.9",
"serverIP": "72.83.40.181"
} | Create a JSON artifact from the message |
<134>Original Address=72.83.40.181 1 1656855253.383053922 M24_MX67C_ForestPark flows src=32.0.80.9 dst=72.83.40.181 protocol=tcp sport=42035 dport=7913 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=72.83.40.181 1 1656855253.383053922 M24_MX67C_ForestPark flows src=32.0.80.9 dst=72.83.40.181 protocol=tcp sport=42035 dport=7913 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7913
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 32.0.80.9
serverIP: 72.83.40.181 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=193.99.94.193 dst=62.221.8.8 protocol=tcp sport=42035 dport=44561 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=193.99.94.193 dst=62.221.8.8 protocol=tcp sport=42035 dport=44561 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "62.221.8.8",
"serverIP": "193.99.94.193"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=193.99.94.193 dst=62.221.8.8 protocol=tcp sport=42035 dport=44561 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=193.99.94.193 dst=62.221.8.8 protocol=tcp sport=42035 dport=44561 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44561
protocol: 6
streamName: meraki
clientIP: 62.221.8.8
serverIP: 193.99.94.193 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=250.157.112.155 dst=105.248.97.213 protocol=tcp sport=42035 dport=44561 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=250.157.112.155 dst=105.248.97.213 protocol=tcp sport=42035 dport=44561 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.248.97.213",
"serverIP": "250.157.112.155"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=250.157.112.155 dst=105.248.97.213 protocol=tcp sport=42035 dport=44561 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=250.157.112.155 dst=105.248.97.213 protocol=tcp sport=42035 dport=44561 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44561
protocol: 6
streamName: meraki
clientIP: 105.248.97.213
serverIP: 250.157.112.155 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=104.213.8.166 dst=255.251.97.78 protocol=tcp sport=42035 dport=44561 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=104.213.8.166 dst=255.251.97.78 protocol=tcp sport=42035 dport=44561 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "255.251.97.78",
"serverIP": "104.213.8.166"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=104.213.8.166 dst=255.251.97.78 protocol=tcp sport=42035 dport=44561 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=104.213.8.166 dst=255.251.97.78 protocol=tcp sport=42035 dport=44561 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44561
protocol: 6
streamName: meraki
clientIP: 255.251.97.78
serverIP: 104.213.8.166 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=42.182.238.47 dst=157.0.149.91 protocol=tcp sport=42035 dport=44561 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=42.182.238.47 dst=157.0.149.91 protocol=tcp sport=42035 dport=44561 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "157.0.149.91",
"serverIP": "42.182.238.47"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=42.182.238.47 dst=157.0.149.91 protocol=tcp sport=42035 dport=44561 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1656855488.143024535 M53_MX67C_GulfShores flows src=42.182.238.47 dst=157.0.149.91 protocol=tcp sport=42035 dport=44561 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44561
protocol: 6
streamName: meraki
clientIP: 157.0.149.91
serverIP: 42.182.238.47 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=21.116.34.216 dst=135.159.145.23 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=21.116.34.216 dst=135.159.145.23 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "21.116.34.216",
"serverIP": "135.159.145.23"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=21.116.34.216 dst=135.159.145.23 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=21.116.34.216 dst=135.159.145.23 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 21.116.34.216
serverIP: 135.159.145.23 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=96.83.133.130 dst=139.94.118.220 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=96.83.133.130 dst=139.94.118.220 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.83.133.130",
"serverIP": "139.94.118.220"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=96.83.133.130 dst=139.94.118.220 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=96.83.133.130 dst=139.94.118.220 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 96.83.133.130
serverIP: 139.94.118.220 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=115.100.191.39 dst=145.44.167.189 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=115.100.191.39 dst=145.44.167.189 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "115.100.191.39",
"serverIP": "145.44.167.189"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=115.100.191.39 dst=145.44.167.189 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=115.100.191.39 dst=145.44.167.189 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 115.100.191.39
serverIP: 145.44.167.189 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=68.215.54.57 dst=151.225.201.195 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=68.215.54.57 dst=151.225.201.195 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "68.215.54.57",
"serverIP": "151.225.201.195"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=68.215.54.57 dst=151.225.201.195 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855498.166390148 M52_MX67C_Loxley flows src=68.215.54.57 dst=151.225.201.195 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 68.215.54.57
serverIP: 151.225.201.195 | Explain this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:230.246.83.66/39017 dst dmz-1:149.1.118.61/81 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:230.246.83.66/39017 dst dmz-1:149.1.118.61/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39017,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "230.246.83.66",
"serverIP": "149.1.118.61"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:230.246.83.66/39017 dst dmz-1:149.1.118.61/81 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:230.246.83.66/39017 dst dmz-1:149.1.118.61/81 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39017
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 230.246.83.66
serverIP: 149.1.118.61 | Explain this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:50.184.113.19/39017 dst dmz-1:8.187.191.167/81 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:50.184.113.19/39017 dst dmz-1:8.187.191.167/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39017,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.184.113.19",
"serverIP": "8.187.191.167"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:50.184.113.19/39017 dst dmz-1:8.187.191.167/81 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:50.184.113.19/39017 dst dmz-1:8.187.191.167/81 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39017
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.184.113.19
serverIP: 8.187.191.167 | Explain this syslog message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:67.148.77.125/53788 dst dmz-1:124.153.226.73/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:67.148.77.125/53788 dst dmz-1:124.153.226.73/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.148.77.125",
"serverIP": "124.153.226.73"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:67.148.77.125/53788 dst dmz-1:124.153.226.73/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:67.148.77.125/53788 dst dmz-1:124.153.226.73/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 67.148.77.125
serverIP: 124.153.226.73 | Explain this syslog message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:250.125.255.139/53788 dst dmz-1:79.1.244.80/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:250.125.255.139/53788 dst dmz-1:79.1.244.80/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "250.125.255.139",
"serverIP": "79.1.244.80"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:250.125.255.139/53788 dst dmz-1:79.1.244.80/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:15: %ASA-4-106023: Deny udp src outside:250.125.255.139/53788 dst dmz-1:79.1.244.80/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 250.125.255.139
serverIP: 79.1.244.80 | Explain this syslog message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:221.139.85.202/47522 dst dmz-1:51.42.103.248/21299 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21299,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:221.139.85.202/47522 dst dmz-1:51.42.103.248/21299 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47522,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.139.85.202",
"serverIP": "51.42.103.248"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:221.139.85.202/47522 dst dmz-1:51.42.103.248/21299 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:221.139.85.202/47522 dst dmz-1:51.42.103.248/21299 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21299
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47522
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.139.85.202
serverIP: 51.42.103.248 | Explain this syslog message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:134.244.54.52/47522 dst dmz-1:65.27.252.180/21299 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 21299,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:134.244.54.52/47522 dst dmz-1:65.27.252.180/21299 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47522,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "134.244.54.52",
"serverIP": "65.27.252.180"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:134.244.54.52/47522 dst dmz-1:65.27.252.180/21299 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:40: %ASA-4-106023: Deny tcp src outside:134.244.54.52/47522 dst dmz-1:65.27.252.180/21299 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 21299
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47522
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 134.244.54.52
serverIP: 65.27.252.180 | Explain this syslog message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:10.201.165.122/53788 dst dmz-1:161.32.89.205/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:10.201.165.122/53788 dst dmz-1:161.32.89.205/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "10.201.165.122",
"serverIP": "161.32.89.205"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:10.201.165.122/53788 dst dmz-1:161.32.89.205/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:10.201.165.122/53788 dst dmz-1:161.32.89.205/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 10.201.165.122
serverIP: 161.32.89.205 | Explain this syslog message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:35.192.18.209/53788 dst dmz-1:169.191.95.141/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:35.192.18.209/53788 dst dmz-1:169.191.95.141/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.192.18.209",
"serverIP": "169.191.95.141"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:35.192.18.209/53788 dst dmz-1:169.191.95.141/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:02: %ASA-4-106023: Deny udp src outside:35.192.18.209/53788 dst dmz-1:169.191.95.141/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 35.192.18.209
serverIP: 169.191.95.141 | Explain this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:40.64.233.135/53788 dst dmz-1:92.126.12.80/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:40.64.233.135/53788 dst dmz-1:92.126.12.80/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "40.64.233.135",
"serverIP": "92.126.12.80"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:40.64.233.135/53788 dst dmz-1:92.126.12.80/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:40.64.233.135/53788 dst dmz-1:92.126.12.80/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 40.64.233.135
serverIP: 92.126.12.80 | Explain this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:220.192.182.138/53788 dst dmz-1:160.144.185.185/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:220.192.182.138/53788 dst dmz-1:160.144.185.185/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "220.192.182.138",
"serverIP": "160.144.185.185"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:220.192.182.138/53788 dst dmz-1:160.144.185.185/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:220.192.182.138/53788 dst dmz-1:160.144.185.185/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 220.192.182.138
serverIP: 160.144.185.185 | Explain this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:82.161.10.198/53788 dst dmz-1:187.236.48.230/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:82.161.10.198/53788 dst dmz-1:187.236.48.230/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "82.161.10.198",
"serverIP": "187.236.48.230"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:82.161.10.198/53788 dst dmz-1:187.236.48.230/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:82.161.10.198/53788 dst dmz-1:187.236.48.230/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 82.161.10.198
serverIP: 187.236.48.230 | Explain this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:24.158.136.18/53788 dst dmz-1:229.61.115.13/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:24.158.136.18/53788 dst dmz-1:229.61.115.13/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.158.136.18",
"serverIP": "229.61.115.13"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:24.158.136.18/53788 dst dmz-1:229.61.115.13/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:09: %ASA-4-106023: Deny udp src outside:24.158.136.18/53788 dst dmz-1:229.61.115.13/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 24.158.136.18
serverIP: 229.61.115.13 | Explain this syslog message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:198.251.231.165/52037 dst dmz-1:58.122.174.129/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:198.251.231.165/52037 dst dmz-1:58.122.174.129/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52037,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "198.251.231.165",
"serverIP": "58.122.174.129"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:198.251.231.165/52037 dst dmz-1:58.122.174.129/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:198.251.231.165/52037 dst dmz-1:58.122.174.129/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52037
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 198.251.231.165
serverIP: 58.122.174.129 | Explain this syslog message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:231.247.131.169/52037 dst dmz-1:223.18.1.32/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:231.247.131.169/52037 dst dmz-1:223.18.1.32/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52037,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "231.247.131.169",
"serverIP": "223.18.1.32"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:231.247.131.169/52037 dst dmz-1:223.18.1.32/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:20: %ASA-4-106023: Deny tcp src outside:231.247.131.169/52037 dst dmz-1:223.18.1.32/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52037
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 231.247.131.169
serverIP: 223.18.1.32 | Explain this syslog message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:14.147.61.187/53788 dst dmz-1:240.20.32.14/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:14.147.61.187/53788 dst dmz-1:240.20.32.14/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "14.147.61.187",
"serverIP": "240.20.32.14"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:14.147.61.187/53788 dst dmz-1:240.20.32.14/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:14.147.61.187/53788 dst dmz-1:240.20.32.14/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 14.147.61.187
serverIP: 240.20.32.14 | Explain this syslog message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:44.76.219.136/53788 dst dmz-1:254.229.78.92/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:44.76.219.136/53788 dst dmz-1:254.229.78.92/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53788,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "44.76.219.136",
"serverIP": "254.229.78.92"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:44.76.219.136/53788 dst dmz-1:254.229.78.92/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:26: %ASA-4-106023: Deny udp src outside:44.76.219.136/53788 dst dmz-1:254.229.78.92/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53788
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 44.76.219.136
serverIP: 254.229.78.92 | Explain this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:228.167.82.35/39017 dst dmz-1:195.102.192.60/81 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:228.167.82.35/39017 dst dmz-1:195.102.192.60/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39017,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.167.82.35",
"serverIP": "195.102.192.60"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:228.167.82.35/39017 dst dmz-1:195.102.192.60/81 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:228.167.82.35/39017 dst dmz-1:195.102.192.60/81 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39017
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.167.82.35
serverIP: 195.102.192.60 | Explain this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:141.162.38.225/39017 dst dmz-1:24.150.230.129/81 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 81,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:141.162.38.225/39017 dst dmz-1:24.150.230.129/81 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39017,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.162.38.225",
"serverIP": "24.150.230.129"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:141.162.38.225/39017 dst dmz-1:24.150.230.129/81 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:32: %ASA-4-106023: Deny tcp src outside:141.162.38.225/39017 dst dmz-1:24.150.230.129/81 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 81
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39017
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.162.38.225
serverIP: 24.150.230.129 | Explain this syslog message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:248.49.107.251/42461 dst dmz-1:88.51.40.149/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:248.49.107.251/42461 dst dmz-1:88.51.40.149/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42461,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "248.49.107.251",
"serverIP": "88.51.40.149"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:248.49.107.251/42461 dst dmz-1:88.51.40.149/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:248.49.107.251/42461 dst dmz-1:88.51.40.149/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42461
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 248.49.107.251
serverIP: 88.51.40.149 | Explain this syslog message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:140.105.160.136/42461 dst dmz-1:118.122.248.94/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:140.105.160.136/42461 dst dmz-1:118.122.248.94/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42461,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.105.160.136",
"serverIP": "118.122.248.94"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:140.105.160.136/42461 dst dmz-1:118.122.248.94/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:43: %ASA-4-106023: Deny tcp src outside:140.105.160.136/42461 dst dmz-1:118.122.248.94/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42461
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.105.160.136
serverIP: 118.122.248.94 | Explain this syslog message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:229.150.247.18/18746 dst dmz-1:247.86.20.236/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:229.150.247.18/18746 dst dmz-1:247.86.20.236/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18746,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "229.150.247.18",
"serverIP": "247.86.20.236"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:229.150.247.18/18746 dst dmz-1:247.86.20.236/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:229.150.247.18/18746 dst dmz-1:247.86.20.236/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18746
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 229.150.247.18
serverIP: 247.86.20.236 | Explain this syslog message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:227.32.39.50/18746 dst dmz-1:148.220.73.196/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:227.32.39.50/18746 dst dmz-1:148.220.73.196/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18746,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "227.32.39.50",
"serverIP": "148.220.73.196"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:227.32.39.50/18746 dst dmz-1:148.220.73.196/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:44: %ASA-4-106023: Deny tcp src outside:227.32.39.50/18746 dst dmz-1:148.220.73.196/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18746
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 227.32.39.50
serverIP: 148.220.73.196 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.