input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "45.223.55.66",
"serverIP": "254.60.243.176"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:45.223.55.66/50343 dst dmz-1:254.60.243.176/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 45.223.55.66
serverIP: 254.60.243.176 | Explain this syslog message |
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50343,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "135.183.31.154",
"serverIP": "64.72.100.83"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:52: %ASA-4-106023: Deny tcp src outside:135.183.31.154/50343 dst dmz-1:64.72.100.83/6514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50343
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 135.183.31.154
serverIP: 64.72.100.83 | Explain this syslog message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43519,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "249.169.244.3",
"serverIP": "122.37.230.97"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:249.169.244.3/43519 dst dmz-1:122.37.230.97/9306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43519
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 249.169.244.3
serverIP: 122.37.230.97 | Explain this syslog message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43519,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "242.227.189.158",
"serverIP": "9.236.60.7"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:21: %ASA-4-106023: Deny tcp src outside:242.227.189.158/43519 dst dmz-1:9.236.60.7/9306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43519
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 242.227.189.158
serverIP: 9.236.60.7 | Explain this syslog message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60424,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "249.45.199.4",
"serverIP": "62.12.129.69"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:249.45.199.4/60424 dst dmz-1:62.12.129.69/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60424
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 249.45.199.4
serverIP: 62.12.129.69 | Explain this syslog message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60424,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "159.195.86.54",
"serverIP": "67.122.249.7"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:41:29: %ASA-4-106023: Deny tcp src outside:159.195.86.54/60424 dst dmz-1:67.122.249.7/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60424
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 159.195.86.54
serverIP: 67.122.249.7 | Explain this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53635,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.152.71.112",
"serverIP": "162.35.50.50"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:162.35.50.50/43080 dst dmz-1:119.152.71.112/53635 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53635
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.152.71.112
serverIP: 162.35.50.50 | Explain this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53635,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "0.162.104.228",
"serverIP": "121.250.12.89"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:121.250.12.89/43080 dst dmz-1:0.162.104.228/53635 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53635
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 0.162.104.228
serverIP: 121.250.12.89 | Explain this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53635,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "28.6.9.64",
"serverIP": "134.187.136.192"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:134.187.136.192/43080 dst dmz-1:28.6.9.64/53635 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53635
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 28.6.9.64
serverIP: 134.187.136.192 | Explain this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53635,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "193.189.93.158",
"serverIP": "203.112.219.30"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:42:45: %ASA-4-106023: Deny tcp src outside:203.112.219.30/43080 dst dmz-1:193.189.93.158/53635 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53635
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 193.189.93.158
serverIP: 203.112.219.30 | Explain this syslog message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "203.184.167.57",
"serverIP": "132.98.145.28"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:132.98.145.28/43080 dst dmz-1:203.184.167.57/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 203.184.167.57
serverIP: 132.98.145.28 | Explain this syslog message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "142.255.196.73",
"serverIP": "53.10.29.10"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:30: %ASA-4-106023: Deny tcp src outside:53.10.29.10/43080 dst dmz-1:142.255.196.73/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 142.255.196.73
serverIP: 53.10.29.10 | Explain this syslog message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "212.47.242.27",
"serverIP": "22.68.119.76"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:22.68.119.76/43080 dst dmz-1:212.47.242.27/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 212.47.242.27
serverIP: 22.68.119.76 | Explain this syslog message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.201.227.236",
"serverIP": "177.151.210.101"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:36: %ASA-4-106023: Deny tcp src outside:177.151.210.101/43080 dst dmz-1:50.201.227.236/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.201.227.236
serverIP: 177.151.210.101 | Explain this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "198.188.38.224",
"serverIP": "190.206.138.134"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:190.206.138.134/43080 dst dmz-1:198.188.38.224/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 198.188.38.224
serverIP: 190.206.138.134 | Explain this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "246.248.152.124",
"serverIP": "244.86.121.43"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:244.86.121.43/43080 dst dmz-1:246.248.152.124/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 246.248.152.124
serverIP: 244.86.121.43 | Explain this syslog message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "49.4.79.50",
"serverIP": "156.9.170.27"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:156.9.170.27/43080 dst dmz-1:49.4.79.50/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 49.4.79.50
serverIP: 156.9.170.27 | Explain this syslog message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.23.74.233",
"serverIP": "220.48.95.72"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:51: %ASA-4-106023: Deny tcp src outside:220.48.95.72/43080 dst dmz-1:150.23.74.233/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 150.23.74.233
serverIP: 220.48.95.72 | Explain this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "62.43.92.81",
"serverIP": "242.74.61.44"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:242.74.61.44/43080 dst dmz-1:62.43.92.81/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 62.43.92.81
serverIP: 242.74.61.44 | Explain this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 45266,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.76.115.237",
"serverIP": "215.13.9.99"
} | Create a JSON artifact from the message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 13 2022 06:27:38: %ASA-4-106023: Deny tcp src outside:215.13.9.99/43080 dst dmz-1:140.76.115.237/45266 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 45266
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.76.115.237
serverIP: 215.13.9.99 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35291,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51858,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.151.133.47",
"serverIP": "4.126.59.148"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=117.151.133.47 dst=4.126.59.148 protocol=tcp sport=51858 dport=35291 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35291
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51858
protocol: 6
streamName: meraki
clientIP: 117.151.133.47
serverIP: 4.126.59.148 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35291,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51858,
"protocol": 6,
"streamName": "meraki",
"clientIP": "93.115.72.44",
"serverIP": "224.157.19.168"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=93.115.72.44 dst=224.157.19.168 protocol=tcp sport=51858 dport=35291 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35291
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51858
protocol: 6
streamName: meraki
clientIP: 93.115.72.44
serverIP: 224.157.19.168 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35291,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51858,
"protocol": 6,
"streamName": "meraki",
"clientIP": "18.159.61.59",
"serverIP": "71.168.94.46"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=18.159.61.59 dst=71.168.94.46 protocol=tcp sport=51858 dport=35291 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35291
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51858
protocol: 6
streamName: meraki
clientIP: 18.159.61.59
serverIP: 71.168.94.46 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35291,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51858,
"protocol": 6,
"streamName": "meraki",
"clientIP": "114.150.122.46",
"serverIP": "172.203.20.188"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1667225486.726186417 M52_MX67C_Loxley flows src=114.150.122.46 dst=172.203.20.188 protocol=tcp sport=51858 dport=35291 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35291
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51858
protocol: 6
streamName: meraki
clientIP: 114.150.122.46
serverIP: 172.203.20.188 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137 | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3845,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.129.209.5",
"serverIP": "31.205.248.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.129.209.5 dst=31.205.248.137 protocol=tcp sport=3845 dport=23 pattern: 1 dst 31.205.248.137 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3845
protocol: 6
streamName: meraki
clientIP: 171.129.209.5
serverIP: 31.205.248.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229 | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3845,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.149.246.95",
"serverIP": "49.98.245.229"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=134.149.246.95 dst=49.98.245.229 protocol=tcp sport=3845 dport=23 pattern: 1 dst 49.98.245.229 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3845
protocol: 6
streamName: meraki
clientIP: 134.149.246.95
serverIP: 49.98.245.229 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110 | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3845,
"protocol": 6,
"streamName": "meraki",
"clientIP": "3.37.205.162",
"serverIP": "2.109.29.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=3.37.205.162 dst=2.109.29.110 protocol=tcp sport=3845 dport=23 pattern: 1 dst 2.109.29.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3845
protocol: 6
streamName: meraki
clientIP: 3.37.205.162
serverIP: 2.109.29.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64 | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3845,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.74.123.183",
"serverIP": "17.134.89.64"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1667024830.256865937 NORDC_MX400_1 flows src=171.74.123.183 dst=17.134.89.64 protocol=tcp sport=3845 dport=23 pattern: 1 dst 17.134.89.64 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3845
protocol: 6
streamName: meraki
clientIP: 171.74.123.183
serverIP: 17.134.89.64 | Explain this syslog message |
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40779,
"protocol": 6,
"streamName": "meraki",
"clientIP": "23.107.96.169",
"serverIP": "207.188.165.35"
} | Create a JSON artifact from the message |
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=207.188.165.35 1 1667180241.876224091 M36_MX67C_Athens flows src=23.107.96.169 dst=207.188.165.35 protocol=tcp sport=40779 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40779
protocol: 6
streamName: meraki
clientIP: 23.107.96.169
serverIP: 207.188.165.35 | Explain this syslog message |
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40779,
"protocol": 6,
"streamName": "meraki",
"clientIP": "41.230.212.209",
"serverIP": "166.20.182.118"
} | Create a JSON artifact from the message |
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=166.20.182.118 1 1667180241.876224091 M36_MX67C_Athens flows src=41.230.212.209 dst=166.20.182.118 protocol=tcp sport=40779 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40779
protocol: 6
streamName: meraki
clientIP: 41.230.212.209
serverIP: 166.20.182.118 | Explain this syslog message |
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40779,
"protocol": 6,
"streamName": "meraki",
"clientIP": "70.225.98.190",
"serverIP": "29.80.63.138"
} | Create a JSON artifact from the message |
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=29.80.63.138 1 1667180241.876224091 M36_MX67C_Athens flows src=70.225.98.190 dst=29.80.63.138 protocol=tcp sport=40779 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40779
protocol: 6
streamName: meraki
clientIP: 70.225.98.190
serverIP: 29.80.63.138 | Explain this syslog message |
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40779,
"protocol": 6,
"streamName": "meraki",
"clientIP": "114.1.243.150",
"serverIP": "32.102.69.248"
} | Create a JSON artifact from the message |
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=32.102.69.248 1 1667180241.876224091 M36_MX67C_Athens flows src=114.1.243.150 dst=32.102.69.248 protocol=tcp sport=40779 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40779
protocol: 6
streamName: meraki
clientIP: 114.1.243.150
serverIP: 32.102.69.248 | Explain this syslog message |
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27261,
"protocol": 6,
"streamName": "meraki",
"clientIP": "190.246.209.165",
"serverIP": "122.175.19.17"
} | Create a JSON artifact from the message |
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=122.175.19.17 1 1667059583.050686812 M36_MX67C_Athens flows src=190.246.209.165 dst=122.175.19.17 protocol=tcp sport=27261 dport=389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27261
protocol: 6
streamName: meraki
clientIP: 190.246.209.165
serverIP: 122.175.19.17 | Explain this syslog message |
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27261,
"protocol": 6,
"streamName": "meraki",
"clientIP": "52.84.186.92",
"serverIP": "195.229.109.127"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.