input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:123.93.187.190/63659 dst dmz-1:245.194.191.142/8827 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8827
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 63659
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.93.187.190
serverIP: 245.194.191.142 | Explain this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8827,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 63659,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "104.45.212.52",
"serverIP": "140.173.198.213"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:104.45.212.52/63659 dst dmz-1:140.173.198.213/8827 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8827
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 63659
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 104.45.212.52
serverIP: 140.173.198.213 | Explain this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8827,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 63659,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.121.75.171",
"serverIP": "213.144.99.82"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:157.121.75.171/63659 dst dmz-1:213.144.99.82/8827 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8827
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 63659
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 157.121.75.171
serverIP: 213.144.99.82 | Explain this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8827,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 63659,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "40.213.66.181",
"serverIP": "248.113.129.30"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:34:14: %ASA-4-106023: Deny tcp src outside:40.213.66.181/63659 dst dmz-1:248.113.129.30/8827 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8827
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 63659
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 40.213.66.181
serverIP: 248.113.129.30 | Explain this syslog message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1399,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8174,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "58.199.210.81",
"serverIP": "57.21.255.54"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:58.199.210.81/8174 dst dmz-1:57.21.255.54/1399 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1399
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8174
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 58.199.210.81
serverIP: 57.21.255.54 | Explain this syslog message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1399,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8174,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "245.160.66.233",
"serverIP": "36.236.162.81"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:34:26: %ASA-4-106023: Deny udp src outside:245.160.66.233/8174 dst dmz-1:36.236.162.81/1399 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1399
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8174
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 245.160.66.233
serverIP: 36.236.162.81 | Explain this syslog message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 39049,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "61.218.204.60",
"serverIP": "253.229.196.166"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:61.218.204.60/46347 dst dmz-1:253.229.196.166/39049 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 39049
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 61.218.204.60
serverIP: 253.229.196.166 | Explain this syslog message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 39049,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.65.37.148",
"serverIP": "80.117.110.231"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:35:05: %ASA-4-106023: Deny tcp src outside:32.65.37.148/46347 dst dmz-1:80.117.110.231/39049 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 39049
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 32.65.37.148
serverIP: 80.117.110.231 | Explain this syslog message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1326,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "113.218.19.206",
"serverIP": "195.147.83.111"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:113.218.19.206/57637 dst dmz-1:195.147.83.111/1326 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1326
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57637
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 113.218.19.206
serverIP: 195.147.83.111 | Explain this syslog message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1326,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "133.6.170.13",
"serverIP": "82.164.9.69"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:35:21: %ASA-4-106023: Deny tcp src outside:133.6.170.13/57637 dst dmz-1:82.164.9.69/1326 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1326
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57637
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 133.6.170.13
serverIP: 82.164.9.69 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.225.99.245",
"serverIP": "158.87.25.147"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=171.225.99.245 dst=158.87.25.147 protocol=tcp sport=58561 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58561
protocol: 6
streamName: meraki
clientIP: 171.225.99.245
serverIP: 158.87.25.147 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "83.229.46.17",
"serverIP": "29.202.68.231"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=83.229.46.17 dst=29.202.68.231 protocol=tcp sport=58561 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58561
protocol: 6
streamName: meraki
clientIP: 83.229.46.17
serverIP: 29.202.68.231 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "67.120.54.77",
"serverIP": "106.197.162.182"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=67.120.54.77 dst=106.197.162.182 protocol=tcp sport=58561 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58561
protocol: 6
streamName: meraki
clientIP: 67.120.54.77
serverIP: 106.197.162.182 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "50.249.4.224",
"serverIP": "56.130.21.220"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660165356.147926588 M53_MX67C_GulfShores flows src=50.249.4.224 dst=56.130.21.220 protocol=tcp sport=58561 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58561
protocol: 6
streamName: meraki
clientIP: 50.249.4.224
serverIP: 56.130.21.220 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.132.155.22",
"serverIP": "146.123.108.98"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=212.132.155.22 dst=146.123.108.98 protocol=tcp sport=46295 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46295
protocol: 6
streamName: meraki
clientIP: 212.132.155.22
serverIP: 146.123.108.98 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.81.82.76",
"serverIP": "215.132.255.209"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=229.81.82.76 dst=215.132.255.209 protocol=tcp sport=46295 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46295
protocol: 6
streamName: meraki
clientIP: 229.81.82.76
serverIP: 215.132.255.209 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "249.118.204.3",
"serverIP": "247.76.235.40"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=249.118.204.3 dst=247.76.235.40 protocol=tcp sport=46295 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46295
protocol: 6
streamName: meraki
clientIP: 249.118.204.3
serverIP: 247.76.235.40 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "97.243.148.181",
"serverIP": "64.208.107.182"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660165354.132879773 NORDC_MX400_1 flows src=97.243.148.181 dst=64.208.107.182 protocol=tcp sport=46295 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46295
protocol: 6
streamName: meraki
clientIP: 97.243.148.181
serverIP: 64.208.107.182 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56765,
"protocol": 6,
"streamName": "meraki",
"clientIP": "140.148.84.57",
"serverIP": "47.252.248.44"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=140.148.84.57 dst=47.252.248.44 protocol=tcp sport=56765 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56765
protocol: 6
streamName: meraki
clientIP: 140.148.84.57
serverIP: 47.252.248.44 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56765,
"protocol": 6,
"streamName": "meraki",
"clientIP": "132.61.66.83",
"serverIP": "94.197.46.179"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=132.61.66.83 dst=94.197.46.179 protocol=tcp sport=56765 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56765
protocol: 6
streamName: meraki
clientIP: 132.61.66.83
serverIP: 94.197.46.179 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56765,
"protocol": 6,
"streamName": "meraki",
"clientIP": "92.158.198.106",
"serverIP": "240.69.235.246"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=92.158.198.106 dst=240.69.235.246 protocol=tcp sport=56765 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56765
protocol: 6
streamName: meraki
clientIP: 92.158.198.106
serverIP: 240.69.235.246 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56765,
"protocol": 6,
"streamName": "meraki",
"clientIP": "28.168.89.99",
"serverIP": "214.232.24.135"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656385397.478236800 NORDC_MX400_1 flows src=28.168.89.99 dst=214.232.24.135 protocol=tcp sport=56765 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56765
protocol: 6
streamName: meraki
clientIP: 28.168.89.99
serverIP: 214.232.24.135 | Explain this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42734,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "156.83.62.142",
"serverIP": "172.165.180.34"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:156.83.62.142/42734 dst dmz-1:172.165.180.34/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42734
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 156.83.62.142
serverIP: 172.165.180.34 | Explain this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42734,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "159.158.217.194",
"serverIP": "161.182.173.61"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:159.158.217.194/42734 dst dmz-1:161.182.173.61/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42734
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 159.158.217.194
serverIP: 161.182.173.61 | Explain this syslog message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44661,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.184.25.216",
"serverIP": "241.174.184.237"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:241.174.184.237/44661 dst dmz-1:24.184.25.216/54763 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44661
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 24.184.25.216
serverIP: 241.174.184.237 | Explain this syslog message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 44661,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "187.212.57.184",
"serverIP": "143.170.194.61"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:26: %ASA-4-106023: Deny tcp src outside:143.170.194.61/44661 dst dmz-1:187.212.57.184/54763 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 44661
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 187.212.57.184
serverIP: 143.170.194.61 | Explain this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42734,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "90.142.80.125",
"serverIP": "109.106.196.49"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:90.142.80.125/42734 dst dmz-1:109.106.196.49/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42734
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 90.142.80.125
serverIP: 109.106.196.49 | Explain this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42734,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "68.102.62.148",
"serverIP": "130.253.15.195"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:32:45: %ASA-4-106023: Deny tcp src outside:68.102.62.148/42734 dst dmz-1:130.253.15.195/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42734
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 68.102.62.148
serverIP: 130.253.15.195 | Explain this syslog message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 47,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "132.219.121.176",
"serverIP": "241.117.15.217"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:132.219.121.176 dst dmz-1:241.117.15.217 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 47
facilitycode: 20
streamName: cisco_asa
clientIP: 132.219.121.176
serverIP: 241.117.15.217 | Explain this syslog message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 47,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "34.143.223.251",
"serverIP": "254.76.253.122"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:33:08: %ASA-4-106023: Deny protocol 47 src outside:34.143.223.251 dst dmz-1:254.76.253.122 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 47
facilitycode: 20
streamName: cisco_asa
clientIP: 34.143.223.251
serverIP: 254.76.253.122 | Explain this syslog message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 64469,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "53.37.102.69",
"serverIP": "177.215.215.108"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:53.37.102.69/64469 dst dmz-1:177.215.215.108/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 64469
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 53.37.102.69
serverIP: 177.215.215.108 | Explain this syslog message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 64469,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "145.167.141.104",
"serverIP": "54.132.35.45"
} | Create a JSON artifact from the message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 26 2022 19:34:08: %ASA-4-106023: Deny tcp src outside:145.167.141.104/64469 dst dmz-1:54.132.35.45/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 64469
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 145.167.141.104
serverIP: 54.132.35.45 | Explain this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39558,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "117.39.80.220",
"serverIP": "99.207.63.210"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:117.39.80.220/39558 dst dmz-1:99.207.63.210/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39558
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 117.39.80.220
serverIP: 99.207.63.210 | Explain this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39558,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.167.15.46",
"serverIP": "30.237.72.10"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:35.167.15.46/39558 dst dmz-1:30.237.72.10/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39558
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 35.167.15.46
serverIP: 30.237.72.10 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.