input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=195.229.109.127 1 1667059583.050686812 M36_MX67C_Athens flows src=52.84.186.92 dst=195.229.109.127 protocol=tcp sport=27261 dport=389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27261
protocol: 6
streamName: meraki
clientIP: 52.84.186.92
serverIP: 195.229.109.127 | Explain this syslog message |
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27261,
"protocol": 6,
"streamName": "meraki",
"clientIP": "202.207.124.228",
"serverIP": "76.118.178.90"
} | Create a JSON artifact from the message |
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=76.118.178.90 1 1667059583.050686812 M36_MX67C_Athens flows src=202.207.124.228 dst=76.118.178.90 protocol=tcp sport=27261 dport=389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27261
protocol: 6
streamName: meraki
clientIP: 202.207.124.228
serverIP: 76.118.178.90 | Explain this syslog message |
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27261,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.119.101.193",
"serverIP": "168.43.205.1"
} | Create a JSON artifact from the message |
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=168.43.205.1 1 1667059583.050686812 M36_MX67C_Athens flows src=229.119.101.193 dst=168.43.205.1 protocol=tcp sport=27261 dport=389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27261
protocol: 6
streamName: meraki
clientIP: 229.119.101.193
serverIP: 168.43.205.1 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 45681,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51005,
"protocol": 6,
"streamName": "meraki",
"clientIP": "62.36.114.191",
"serverIP": "140.20.18.85"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=140.20.18.85 dst=62.36.114.191 protocol=tcp sport=45681 dport=51005 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 45681
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51005
protocol: 6
streamName: meraki
clientIP: 62.36.114.191
serverIP: 140.20.18.85 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 45681,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51005,
"protocol": 6,
"streamName": "meraki",
"clientIP": "85.9.79.20",
"serverIP": "36.136.195.66"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=36.136.195.66 dst=85.9.79.20 protocol=tcp sport=45681 dport=51005 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 45681
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51005
protocol: 6
streamName: meraki
clientIP: 85.9.79.20
serverIP: 36.136.195.66 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 45681,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51005,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.33.44.213",
"serverIP": "250.52.37.49"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=250.52.37.49 dst=171.33.44.213 protocol=tcp sport=45681 dport=51005 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 45681
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51005
protocol: 6
streamName: meraki
clientIP: 171.33.44.213
serverIP: 250.52.37.49 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 45681,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51005,
"protocol": 6,
"streamName": "meraki",
"clientIP": "233.213.85.100",
"serverIP": "35.222.179.144"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1667180241.779139715 M61_MX67C_Savannah flows src=35.222.179.144 dst=233.213.85.100 protocol=tcp sport=45681 dport=51005 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 45681
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51005
protocol: 6
streamName: meraki
clientIP: 233.213.85.100
serverIP: 35.222.179.144 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1433,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52419,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.38.47.131",
"serverIP": "96.9.40.225"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=56.38.47.131 dst=96.9.40.225 protocol=tcp sport=52419 dport=1433 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1433
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52419
protocol: 6
streamName: meraki
clientIP: 56.38.47.131
serverIP: 96.9.40.225 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1433,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52419,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.78.155.45",
"serverIP": "129.60.158.247"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=125.78.155.45 dst=129.60.158.247 protocol=tcp sport=52419 dport=1433 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1433
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52419
protocol: 6
streamName: meraki
clientIP: 125.78.155.45
serverIP: 129.60.158.247 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1433,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52419,
"protocol": 6,
"streamName": "meraki",
"clientIP": "228.131.103.108",
"serverIP": "199.63.112.251"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=228.131.103.108 dst=199.63.112.251 protocol=tcp sport=52419 dport=1433 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1433
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52419
protocol: 6
streamName: meraki
clientIP: 228.131.103.108
serverIP: 199.63.112.251 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1433,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52419,
"protocol": 6,
"streamName": "meraki",
"clientIP": "60.87.145.53",
"serverIP": "207.155.232.119"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1667005926.720051924 M49_MX67C_Montgomery flows src=60.87.145.53 dst=207.155.232.119 protocol=tcp sport=52419 dport=1433 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1433
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52419
protocol: 6
streamName: meraki
clientIP: 60.87.145.53
serverIP: 207.155.232.119 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "2.217.143.247",
"serverIP": "232.49.204.162"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=2.217.143.247 dst=232.49.204.162 protocol=tcp sport=44708 dport=9060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44708
protocol: 6
streamName: meraki
clientIP: 2.217.143.247
serverIP: 232.49.204.162 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "238.120.164.166",
"serverIP": "5.46.180.13"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=238.120.164.166 dst=5.46.180.13 protocol=tcp sport=44708 dport=9060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44708
protocol: 6
streamName: meraki
clientIP: 238.120.164.166
serverIP: 5.46.180.13 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.11.25.105",
"serverIP": "22.50.212.112"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=134.11.25.105 dst=22.50.212.112 protocol=tcp sport=44708 dport=9060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44708
protocol: 6
streamName: meraki
clientIP: 134.11.25.105
serverIP: 22.50.212.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.246.150.221",
"serverIP": "27.217.196.118"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1666986712.001369327 NORDC_MX400_1 flows src=54.246.150.221 dst=27.217.196.118 protocol=tcp sport=44708 dport=9060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44708
protocol: 6
streamName: meraki
clientIP: 54.246.150.221
serverIP: 27.217.196.118 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6066,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52887,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.73.219.32",
"serverIP": "236.52.78.5"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=55.73.219.32 dst=236.52.78.5 protocol=tcp sport=52887 dport=6066 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6066
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52887
protocol: 6
streamName: meraki
clientIP: 55.73.219.32
serverIP: 236.52.78.5 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6066,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52887,
"protocol": 6,
"streamName": "meraki",
"clientIP": "177.9.20.212",
"serverIP": "87.25.104.106"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=177.9.20.212 dst=87.25.104.106 protocol=tcp sport=52887 dport=6066 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6066
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52887
protocol: 6
streamName: meraki
clientIP: 177.9.20.212
serverIP: 87.25.104.106 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6066,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52887,
"protocol": 6,
"streamName": "meraki",
"clientIP": "24.3.7.253",
"serverIP": "187.169.33.222"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=24.3.7.253 dst=187.169.33.222 protocol=tcp sport=52887 dport=6066 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6066
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52887
protocol: 6
streamName: meraki
clientIP: 24.3.7.253
serverIP: 187.169.33.222 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6066,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52887,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.161.216.152",
"serverIP": "98.166.247.219"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1667203915.156505210 M36_MX67C_Athens flows src=6.161.216.152 dst=98.166.247.219 protocol=tcp sport=52887 dport=6066 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6066
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52887
protocol: 6
streamName: meraki
clientIP: 6.161.216.152
serverIP: 98.166.247.219 | Explain this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39553,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "53.65.10.83",
"serverIP": "126.132.51.105"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:53.65.10.83/39553 dst dmz-1:126.132.51.105/8443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39553
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 53.65.10.83
serverIP: 126.132.51.105 | Explain this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39553,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "52.242.23.99",
"serverIP": "196.210.227.250"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:52.242.23.99/39553 dst dmz-1:196.210.227.250/8443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39553
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 52.242.23.99
serverIP: 196.210.227.250 | Explain this syslog message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52685,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "102.201.49.73",
"serverIP": "248.227.103.25"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:102.201.49.73/52685 dst dmz-1:248.227.103.25/7443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52685
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 102.201.49.73
serverIP: 248.227.103.25 | Explain this syslog message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52685,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "182.33.125.16",
"serverIP": "53.108.176.85"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:23:43: %ASA-4-106023: Deny tcp src outside:182.33.125.16/52685 dst dmz-1:53.108.176.85/7443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52685
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 182.33.125.16
serverIP: 53.108.176.85 | Explain this syslog message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.11.245.188",
"serverIP": "37.245.48.39"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:67.11.245.188 dst dmz-1:37.245.48.39 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 20
streamName: cisco_asa
clientIP: 67.11.245.188
serverIP: 37.245.48.39 | Explain this syslog message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "180.192.185.175",
"serverIP": "252.48.8.127"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:23:55: %ASA-4-106023: Deny icmp src outside:180.192.185.175 dst dmz-1:252.48.8.127 (type 8, code 0) by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 20
streamName: cisco_asa
clientIP: 180.192.185.175
serverIP: 252.48.8.127 | Explain this syslog message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35823,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42606,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "217.229.43.212",
"serverIP": "182.105.89.237"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:217.229.43.212/42606 dst dmz-1:182.105.89.237/35823 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35823
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42606
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 217.229.43.212
serverIP: 182.105.89.237 | Explain this syslog message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35823,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42606,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "190.0.99.232",
"serverIP": "58.208.167.53"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:25:16: %ASA-4-106023: Deny tcp src outside:190.0.99.232/42606 dst dmz-1:58.208.167.53/35823 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35823
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42606
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 190.0.99.232
serverIP: 58.208.167.53 | Explain this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43058,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.160.213.207",
"serverIP": "149.131.181.54"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:119.160.213.207/43058 dst dmz-1:149.131.181.54/2222 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43058
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.160.213.207
serverIP: 149.131.181.54 | Explain this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43058,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "43.55.89.81",
"serverIP": "226.19.230.234"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:43.55.89.81/43058 dst dmz-1:226.19.230.234/2222 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43058
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 43.55.89.81
serverIP: 226.19.230.234 | Explain this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35930,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "109.227.74.84",
"serverIP": "169.140.41.234"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:109.227.74.84/35930 dst dmz-1:169.140.41.234/2087 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35930
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 109.227.74.84
serverIP: 169.140.41.234 | Explain this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35930,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "1.101.190.235",
"serverIP": "236.203.54.111"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:15: %ASA-4-106023: Deny tcp src outside:1.101.190.235/35930 dst dmz-1:236.203.54.111/2087 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35930
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 1.101.190.235
serverIP: 236.203.54.111 | Explain this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39553,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.25.71.158",
"serverIP": "123.86.187.122"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:174.25.71.158/39553 dst dmz-1:123.86.187.122/8443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39553
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.25.71.158
serverIP: 123.86.187.122 | Explain this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39553,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "126.86.22.19",
"serverIP": "211.84.107.113"
} | Create a JSON artifact from the message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 20 2022 01:26:19: %ASA-4-106023: Deny tcp src outside:126.86.22.19/39553 dst dmz-1:211.84.107.113/8443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39553
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 126.86.22.19
serverIP: 211.84.107.113 | Explain this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8827,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 63659,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.93.187.190",
"serverIP": "245.194.191.142"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.