input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27261 protocol: 6 streamName: meraki clientIP: 52.84.186.92 serverIP: 195.229.109.127
Explain this syslog message
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27261, "protocol": 6, "streamName": "meraki", "clientIP": "202.207.124.228", "serverIP": "76.118.178.90" }
Create a JSON artifact from the message
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27261 protocol: 6 streamName: meraki clientIP: 202.207.124.228 serverIP: 76.118.178.90
Explain this syslog message
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27261, "protocol": 6, "streamName": "meraki", "clientIP": "229.119.101.193", "serverIP": "168.43.205.1" }
Create a JSON artifact from the message
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27261 protocol: 6 streamName: meraki clientIP: 229.119.101.193 serverIP: 168.43.205.1
Explain this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 45681, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51005, "protocol": 6, "streamName": "meraki", "clientIP": "62.36.114.191", "serverIP": "140.20.18.85" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 45681 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51005 protocol: 6 streamName: meraki clientIP: 62.36.114.191 serverIP: 140.20.18.85
Explain this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 45681, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51005, "protocol": 6, "streamName": "meraki", "clientIP": "85.9.79.20", "serverIP": "36.136.195.66" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 45681 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51005 protocol: 6 streamName: meraki clientIP: 85.9.79.20 serverIP: 36.136.195.66
Explain this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 45681, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51005, "protocol": 6, "streamName": "meraki", "clientIP": "171.33.44.213", "serverIP": "250.52.37.49" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 45681 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51005 protocol: 6 streamName: meraki clientIP: 171.33.44.213 serverIP: 250.52.37.49
Explain this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 45681, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51005, "protocol": 6, "streamName": "meraki", "clientIP": "233.213.85.100", "serverIP": "35.222.179.144" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 45681 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51005 protocol: 6 streamName: meraki clientIP: 233.213.85.100 serverIP: 35.222.179.144
Explain this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 1433, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52419, "protocol": 6, "streamName": "meraki", "clientIP": "56.38.47.131", "serverIP": "96.9.40.225" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 1433 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52419 protocol: 6 streamName: meraki clientIP: 56.38.47.131 serverIP: 96.9.40.225
Explain this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 1433, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52419, "protocol": 6, "streamName": "meraki", "clientIP": "125.78.155.45", "serverIP": "129.60.158.247" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 1433 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52419 protocol: 6 streamName: meraki clientIP: 125.78.155.45 serverIP: 129.60.158.247
Explain this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 1433, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52419, "protocol": 6, "streamName": "meraki", "clientIP": "228.131.103.108", "serverIP": "199.63.112.251" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 1433 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52419 protocol: 6 streamName: meraki clientIP: 228.131.103.108 serverIP: 199.63.112.251
Explain this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 1433, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52419, "protocol": 6, "streamName": "meraki", "clientIP": "60.87.145.53", "serverIP": "207.155.232.119" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 1433 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52419 protocol: 6 streamName: meraki clientIP: 60.87.145.53 serverIP: 207.155.232.119
Explain this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44708, "protocol": 6, "streamName": "meraki", "clientIP": "2.217.143.247", "serverIP": "232.49.204.162" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44708 protocol: 6 streamName: meraki clientIP: 2.217.143.247 serverIP: 232.49.204.162
Explain this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44708, "protocol": 6, "streamName": "meraki", "clientIP": "238.120.164.166", "serverIP": "5.46.180.13" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44708 protocol: 6 streamName: meraki clientIP: 238.120.164.166 serverIP: 5.46.180.13
Explain this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44708, "protocol": 6, "streamName": "meraki", "clientIP": "134.11.25.105", "serverIP": "22.50.212.112" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44708 protocol: 6 streamName: meraki clientIP: 134.11.25.105 serverIP: 22.50.212.112
Explain this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44708, "protocol": 6, "streamName": "meraki", "clientIP": "54.246.150.221", "serverIP": "27.217.196.118" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44708 protocol: 6 streamName: meraki clientIP: 54.246.150.221 serverIP: 27.217.196.118
Explain this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6066, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52887, "protocol": 6, "streamName": "meraki", "clientIP": "55.73.219.32", "serverIP": "236.52.78.5" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6066 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52887 protocol: 6 streamName: meraki clientIP: 55.73.219.32 serverIP: 236.52.78.5
Explain this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6066, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52887, "protocol": 6, "streamName": "meraki", "clientIP": "177.9.20.212", "serverIP": "87.25.104.106" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6066 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52887 protocol: 6 streamName: meraki clientIP: 177.9.20.212 serverIP: 87.25.104.106
Explain this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6066, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52887, "protocol": 6, "streamName": "meraki", "clientIP": "24.3.7.253", "serverIP": "187.169.33.222" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6066 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52887 protocol: 6 streamName: meraki clientIP: 24.3.7.253 serverIP: 187.169.33.222
Explain this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6066, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52887, "protocol": 6, "streamName": "meraki", "clientIP": "6.161.216.152", "serverIP": "98.166.247.219" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6066 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52887 protocol: 6 streamName: meraki clientIP: 6.161.216.152 serverIP: 98.166.247.219
Explain this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39553, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "53.65.10.83", "serverIP": "126.132.51.105" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39553 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 53.65.10.83 serverIP: 126.132.51.105
Explain this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39553, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "52.242.23.99", "serverIP": "196.210.227.250" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39553 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 52.242.23.99 serverIP: 196.210.227.250
Explain this syslog message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52685, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "102.201.49.73", "serverIP": "248.227.103.25" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52685 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 102.201.49.73 serverIP: 248.227.103.25
Explain this syslog message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52685, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "182.33.125.16", "serverIP": "53.108.176.85" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52685 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 182.33.125.16 serverIP: 53.108.176.85
Explain this syslog message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.11.245.188", "serverIP": "37.245.48.39" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 20 streamName: cisco_asa clientIP: 67.11.245.188 serverIP: 37.245.48.39
Explain this syslog message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 1, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "180.192.185.175", "serverIP": "252.48.8.127" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 1 facilitycode: 20 streamName: cisco_asa clientIP: 180.192.185.175 serverIP: 252.48.8.127
Explain this syslog message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 35823, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42606, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "217.229.43.212", "serverIP": "182.105.89.237" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 35823 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42606 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 217.229.43.212 serverIP: 182.105.89.237
Explain this syslog message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 35823, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42606, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "190.0.99.232", "serverIP": "58.208.167.53" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 35823 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42606 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 190.0.99.232 serverIP: 58.208.167.53
Explain this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43058, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.160.213.207", "serverIP": "149.131.181.54" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43058 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.160.213.207 serverIP: 149.131.181.54
Explain this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43058, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "43.55.89.81", "serverIP": "226.19.230.234" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43058 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 43.55.89.81 serverIP: 226.19.230.234
Explain this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35930, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "109.227.74.84", "serverIP": "169.140.41.234" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35930 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 109.227.74.84 serverIP: 169.140.41.234
Explain this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35930, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "1.101.190.235", "serverIP": "236.203.54.111" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35930 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 1.101.190.235 serverIP: 236.203.54.111
Explain this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39553, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.25.71.158", "serverIP": "123.86.187.122" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39553 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.25.71.158 serverIP: 123.86.187.122
Explain this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39553, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "126.86.22.19", "serverIP": "211.84.107.113" }
Create a JSON artifact from the message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39553 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 126.86.22.19 serverIP: 211.84.107.113
Explain this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8827, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 63659, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "123.93.187.190", "serverIP": "245.194.191.142" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message