input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "45.223.55.66", "serverIP": "254.60.243.176" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 45.223.55.66 serverIP: 254.60.243.176
Explain this syslog message
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50343, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "135.183.31.154", "serverIP": "64.72.100.83" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50343 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 135.183.31.154 serverIP: 64.72.100.83
Explain this syslog message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43519, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "249.169.244.3", "serverIP": "122.37.230.97" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43519 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 249.169.244.3 serverIP: 122.37.230.97
Explain this syslog message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9306, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43519, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "242.227.189.158", "serverIP": "9.236.60.7" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9306 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43519 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 242.227.189.158 serverIP: 9.236.60.7
Explain this syslog message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60424, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "249.45.199.4", "serverIP": "62.12.129.69" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60424 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 249.45.199.4 serverIP: 62.12.129.69
Explain this syslog message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60424, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "159.195.86.54", "serverIP": "67.122.249.7" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60424 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 159.195.86.54 serverIP: 67.122.249.7
Explain this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53635, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.152.71.112", "serverIP": "162.35.50.50" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53635 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.152.71.112 serverIP: 162.35.50.50
Explain this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53635, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "0.162.104.228", "serverIP": "121.250.12.89" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53635 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 0.162.104.228 serverIP: 121.250.12.89
Explain this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53635, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "28.6.9.64", "serverIP": "134.187.136.192" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53635 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 28.6.9.64 serverIP: 134.187.136.192
Explain this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53635, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "193.189.93.158", "serverIP": "203.112.219.30" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53635 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 193.189.93.158 serverIP: 203.112.219.30
Explain this syslog message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "203.184.167.57", "serverIP": "132.98.145.28" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 203.184.167.57 serverIP: 132.98.145.28
Explain this syslog message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "142.255.196.73", "serverIP": "53.10.29.10" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 142.255.196.73 serverIP: 53.10.29.10
Explain this syslog message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "212.47.242.27", "serverIP": "22.68.119.76" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 212.47.242.27 serverIP: 22.68.119.76
Explain this syslog message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "50.201.227.236", "serverIP": "177.151.210.101" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 50.201.227.236 serverIP: 177.151.210.101
Explain this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "198.188.38.224", "serverIP": "190.206.138.134" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 198.188.38.224 serverIP: 190.206.138.134
Explain this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "246.248.152.124", "serverIP": "244.86.121.43" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 246.248.152.124 serverIP: 244.86.121.43
Explain this syslog message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "49.4.79.50", "serverIP": "156.9.170.27" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 49.4.79.50 serverIP: 156.9.170.27
Explain this syslog message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "150.23.74.233", "serverIP": "220.48.95.72" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 150.23.74.233 serverIP: 220.48.95.72
Explain this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "62.43.92.81", "serverIP": "242.74.61.44" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 62.43.92.81 serverIP: 242.74.61.44
Explain this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 45266, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "140.76.115.237", "serverIP": "215.13.9.99" }
Create a JSON artifact from the message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 45266 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 140.76.115.237 serverIP: 215.13.9.99
Explain this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35291, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51858, "protocol": 6, "streamName": "meraki", "clientIP": "117.151.133.47", "serverIP": "4.126.59.148" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35291 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51858 protocol: 6 streamName: meraki clientIP: 117.151.133.47 serverIP: 4.126.59.148
Explain this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35291, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51858, "protocol": 6, "streamName": "meraki", "clientIP": "93.115.72.44", "serverIP": "224.157.19.168" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35291 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51858 protocol: 6 streamName: meraki clientIP: 93.115.72.44 serverIP: 224.157.19.168
Explain this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35291, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51858, "protocol": 6, "streamName": "meraki", "clientIP": "18.159.61.59", "serverIP": "71.168.94.46" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35291 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51858 protocol: 6 streamName: meraki clientIP: 18.159.61.59 serverIP: 71.168.94.46
Explain this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35291, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51858, "protocol": 6, "streamName": "meraki", "clientIP": "114.150.122.46", "serverIP": "172.203.20.188" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35291 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51858 protocol: 6 streamName: meraki clientIP: 114.150.122.46 serverIP: 172.203.20.188
Explain this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3845, "protocol": 6, "streamName": "meraki", "clientIP": "171.129.209.5", "serverIP": "31.205.248.137" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3845 protocol: 6 streamName: meraki clientIP: 171.129.209.5 serverIP: 31.205.248.137
Explain this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3845, "protocol": 6, "streamName": "meraki", "clientIP": "134.149.246.95", "serverIP": "49.98.245.229" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3845 protocol: 6 streamName: meraki clientIP: 134.149.246.95 serverIP: 49.98.245.229
Explain this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3845, "protocol": 6, "streamName": "meraki", "clientIP": "3.37.205.162", "serverIP": "2.109.29.110" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3845 protocol: 6 streamName: meraki clientIP: 3.37.205.162 serverIP: 2.109.29.110
Explain this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3845, "protocol": 6, "streamName": "meraki", "clientIP": "171.74.123.183", "serverIP": "17.134.89.64" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3845 protocol: 6 streamName: meraki clientIP: 171.74.123.183 serverIP: 17.134.89.64
Explain this syslog message
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40779, "protocol": 6, "streamName": "meraki", "clientIP": "23.107.96.169", "serverIP": "207.188.165.35" }
Create a JSON artifact from the message
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40779 protocol: 6 streamName: meraki clientIP: 23.107.96.169 serverIP: 207.188.165.35
Explain this syslog message
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40779, "protocol": 6, "streamName": "meraki", "clientIP": "41.230.212.209", "serverIP": "166.20.182.118" }
Create a JSON artifact from the message
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40779 protocol: 6 streamName: meraki clientIP: 41.230.212.209 serverIP: 166.20.182.118
Explain this syslog message
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40779, "protocol": 6, "streamName": "meraki", "clientIP": "70.225.98.190", "serverIP": "29.80.63.138" }
Create a JSON artifact from the message
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40779 protocol: 6 streamName: meraki clientIP: 70.225.98.190 serverIP: 29.80.63.138
Explain this syslog message
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40779, "protocol": 6, "streamName": "meraki", "clientIP": "114.1.243.150", "serverIP": "32.102.69.248" }
Create a JSON artifact from the message
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40779 protocol: 6 streamName: meraki clientIP: 114.1.243.150 serverIP: 32.102.69.248
Explain this syslog message
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27261, "protocol": 6, "streamName": "meraki", "clientIP": "190.246.209.165", "serverIP": "122.175.19.17" }
Create a JSON artifact from the message
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27261 protocol: 6 streamName: meraki clientIP: 190.246.209.165 serverIP: 122.175.19.17
Explain this syslog message
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27261, "protocol": 6, "streamName": "meraki", "clientIP": "52.84.186.92", "serverIP": "195.229.109.127" }
Create a JSON artifact from the message