input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8827 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 63659 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 123.93.187.190 serverIP: 245.194.191.142
Explain this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8827, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 63659, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "104.45.212.52", "serverIP": "140.173.198.213" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8827 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 63659 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 104.45.212.52 serverIP: 140.173.198.213
Explain this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8827, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 63659, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "157.121.75.171", "serverIP": "213.144.99.82" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8827 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 63659 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 157.121.75.171 serverIP: 213.144.99.82
Explain this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8827, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 63659, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "40.213.66.181", "serverIP": "248.113.129.30" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8827 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 63659 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 40.213.66.181 serverIP: 248.113.129.30
Explain this syslog message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1399, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8174, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "58.199.210.81", "serverIP": "57.21.255.54" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1399 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8174 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 58.199.210.81 serverIP: 57.21.255.54
Explain this syslog message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1399, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8174, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "245.160.66.233", "serverIP": "36.236.162.81" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1399 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8174 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 245.160.66.233 serverIP: 36.236.162.81
Explain this syslog message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 39049, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "61.218.204.60", "serverIP": "253.229.196.166" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 39049 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 61.218.204.60 serverIP: 253.229.196.166
Explain this syslog message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 39049, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "32.65.37.148", "serverIP": "80.117.110.231" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 39049 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 32.65.37.148 serverIP: 80.117.110.231
Explain this syslog message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1326, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "113.218.19.206", "serverIP": "195.147.83.111" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1326 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57637 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 113.218.19.206 serverIP: 195.147.83.111
Explain this syslog message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1326, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "133.6.170.13", "serverIP": "82.164.9.69" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1326 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57637 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 133.6.170.13 serverIP: 82.164.9.69
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58561, "protocol": 6, "streamName": "meraki", "clientIP": "171.225.99.245", "serverIP": "158.87.25.147" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58561 protocol: 6 streamName: meraki clientIP: 171.225.99.245 serverIP: 158.87.25.147
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58561, "protocol": 6, "streamName": "meraki", "clientIP": "83.229.46.17", "serverIP": "29.202.68.231" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58561 protocol: 6 streamName: meraki clientIP: 83.229.46.17 serverIP: 29.202.68.231
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58561, "protocol": 6, "streamName": "meraki", "clientIP": "67.120.54.77", "serverIP": "106.197.162.182" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58561 protocol: 6 streamName: meraki clientIP: 67.120.54.77 serverIP: 106.197.162.182
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58561, "protocol": 6, "streamName": "meraki", "clientIP": "50.249.4.224", "serverIP": "56.130.21.220" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58561 protocol: 6 streamName: meraki clientIP: 50.249.4.224 serverIP: 56.130.21.220
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46295, "protocol": 6, "streamName": "meraki", "clientIP": "212.132.155.22", "serverIP": "146.123.108.98" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46295 protocol: 6 streamName: meraki clientIP: 212.132.155.22 serverIP: 146.123.108.98
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46295, "protocol": 6, "streamName": "meraki", "clientIP": "229.81.82.76", "serverIP": "215.132.255.209" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46295 protocol: 6 streamName: meraki clientIP: 229.81.82.76 serverIP: 215.132.255.209
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46295, "protocol": 6, "streamName": "meraki", "clientIP": "249.118.204.3", "serverIP": "247.76.235.40" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46295 protocol: 6 streamName: meraki clientIP: 249.118.204.3 serverIP: 247.76.235.40
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46295, "protocol": 6, "streamName": "meraki", "clientIP": "97.243.148.181", "serverIP": "64.208.107.182" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46295 protocol: 6 streamName: meraki clientIP: 97.243.148.181 serverIP: 64.208.107.182
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56765, "protocol": 6, "streamName": "meraki", "clientIP": "140.148.84.57", "serverIP": "47.252.248.44" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56765 protocol: 6 streamName: meraki clientIP: 140.148.84.57 serverIP: 47.252.248.44
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56765, "protocol": 6, "streamName": "meraki", "clientIP": "132.61.66.83", "serverIP": "94.197.46.179" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56765 protocol: 6 streamName: meraki clientIP: 132.61.66.83 serverIP: 94.197.46.179
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56765, "protocol": 6, "streamName": "meraki", "clientIP": "92.158.198.106", "serverIP": "240.69.235.246" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56765 protocol: 6 streamName: meraki clientIP: 92.158.198.106 serverIP: 240.69.235.246
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5555, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56765, "protocol": 6, "streamName": "meraki", "clientIP": "28.168.89.99", "serverIP": "214.232.24.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5555 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56765 protocol: 6 streamName: meraki clientIP: 28.168.89.99 serverIP: 214.232.24.135
Explain this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42734, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "156.83.62.142", "serverIP": "172.165.180.34" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42734 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 156.83.62.142 serverIP: 172.165.180.34
Explain this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42734, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "159.158.217.194", "serverIP": "161.182.173.61" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42734 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 159.158.217.194 serverIP: 161.182.173.61
Explain this syslog message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44661, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54763, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "24.184.25.216", "serverIP": "241.174.184.237" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44661 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54763 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 24.184.25.216 serverIP: 241.174.184.237
Explain this syslog message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 44661, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54763, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "187.212.57.184", "serverIP": "143.170.194.61" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 44661 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54763 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 187.212.57.184 serverIP: 143.170.194.61
Explain this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42734, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "90.142.80.125", "serverIP": "109.106.196.49" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42734 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 90.142.80.125 serverIP: 109.106.196.49
Explain this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42734, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "68.102.62.148", "serverIP": "130.253.15.195" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42734 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 68.102.62.148 serverIP: 130.253.15.195
Explain this syslog message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 47, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "132.219.121.176", "serverIP": "241.117.15.217" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 47 facilitycode: 20 streamName: cisco_asa clientIP: 132.219.121.176 serverIP: 241.117.15.217
Explain this syslog message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "vendorcode": "ASA-4-106023", "action": "block", "protocol": 47, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "34.143.223.251", "serverIP": "254.76.253.122" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action vendorcode: ASA-4-106023 action: block protocol: 47 facilitycode: 20 streamName: cisco_asa clientIP: 34.143.223.251 serverIP: 254.76.253.122
Explain this syslog message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 64469, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "53.37.102.69", "serverIP": "177.215.215.108" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 64469 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 53.37.102.69 serverIP: 177.215.215.108
Explain this syslog message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 64469, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "145.167.141.104", "serverIP": "54.132.35.45" }
Create a JSON artifact from the message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 64469 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 145.167.141.104 serverIP: 54.132.35.45
Explain this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39558, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "117.39.80.220", "serverIP": "99.207.63.210" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39558 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 117.39.80.220 serverIP: 99.207.63.210
Explain this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39558, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "35.167.15.46", "serverIP": "30.237.72.10" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39558 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 35.167.15.46 serverIP: 30.237.72.10
Explain this syslog message