input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26482 protocol: 6 streamName: meraki clientIP: 206.161.99.183 serverIP: 24.12.58.184
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26482, "protocol": 6, "streamName": "meraki", "clientIP": "43.194.131.87", "serverIP": "22.99.143.38" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26482 protocol: 6 streamName: meraki clientIP: 43.194.131.87 serverIP: 22.99.143.38
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26482, "protocol": 6, "streamName": "meraki", "clientIP": "52.101.217.54", "serverIP": "174.26.127.35" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26482 protocol: 6 streamName: meraki clientIP: 52.101.217.54 serverIP: 174.26.127.35
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46688, "protocol": 6, "streamName": "meraki", "clientIP": "76.7.116.8", "serverIP": "84.133.104.90" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46688 protocol: 6 streamName: meraki clientIP: 76.7.116.8 serverIP: 84.133.104.90
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46688, "protocol": 6, "streamName": "meraki", "clientIP": "246.111.110.97", "serverIP": "217.162.222.143" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46688 protocol: 6 streamName: meraki clientIP: 246.111.110.97 serverIP: 217.162.222.143
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 30289, "protocol": 6, "streamName": "meraki", "clientIP": "98.210.201.48", "serverIP": "201.86.102.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 30289 protocol: 6 streamName: meraki clientIP: 98.210.201.48 serverIP: 201.86.102.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 30289, "protocol": 6, "streamName": "meraki", "clientIP": "60.197.155.67", "serverIP": "127.254.57.209" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 30289 protocol: 6 streamName: meraki clientIP: 60.197.155.67 serverIP: 127.254.57.209
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 10052, "protocol": 6, "streamName": "meraki", "clientIP": "235.95.141.145", "serverIP": "156.91.125.79" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 10052 protocol: 6 streamName: meraki clientIP: 235.95.141.145 serverIP: 156.91.125.79
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 10052, "protocol": 6, "streamName": "meraki", "clientIP": "141.9.187.35", "serverIP": "163.119.19.206" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 10052 protocol: 6 streamName: meraki clientIP: 141.9.187.35 serverIP: 163.119.19.206
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32590, "protocol": 6, "streamName": "meraki", "clientIP": "56.104.29.173", "serverIP": "17.174.46.87" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32590 protocol: 6 streamName: meraki clientIP: 56.104.29.173 serverIP: 17.174.46.87
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32590, "protocol": 6, "streamName": "meraki", "clientIP": "233.225.82.151", "serverIP": "140.245.243.177" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32590 protocol: 6 streamName: meraki clientIP: 233.225.82.151 serverIP: 140.245.243.177
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "55.131.26.136", "serverIP": "215.22.35.31" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 55.131.26.136 serverIP: 215.22.35.31
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "196.165.127.96", "serverIP": "178.220.227.49" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 196.165.127.96 serverIP: 178.220.227.49
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 18029, "protocol": 6, "streamName": "meraki", "clientIP": "172.90.39.7", "serverIP": "133.97.145.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 18029 protocol: 6 streamName: meraki clientIP: 172.90.39.7 serverIP: 133.97.145.8
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 18029, "protocol": 6, "streamName": "meraki", "clientIP": "253.34.165.213", "serverIP": "33.105.126.186" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 18029 protocol: 6 streamName: meraki clientIP: 253.34.165.213 serverIP: 33.105.126.186
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27361, "protocol": 6, "streamName": "meraki", "clientIP": "34.8.92.237", "serverIP": "225.23.90.58" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27361 protocol: 6 streamName: meraki clientIP: 34.8.92.237 serverIP: 225.23.90.58
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27361, "protocol": 6, "streamName": "meraki", "clientIP": "234.77.43.15", "serverIP": "139.111.243.27" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27361 protocol: 6 streamName: meraki clientIP: 234.77.43.15 serverIP: 139.111.243.27
Explain this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "76.55.232.167", "serverIP": "113.232.36.124" }
Create a JSON artifact from the message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 76.55.232.167 serverIP: 113.232.36.124
Explain this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "70.70.147.62", "serverIP": "58.229.175.214" }
Create a JSON artifact from the message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 70.70.147.62 serverIP: 58.229.175.214
Explain this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "152.63.41.18", "serverIP": "230.203.90.218" }
Create a JSON artifact from the message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 152.63.41.18 serverIP: 230.203.90.218
Explain this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54758, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "55.44.58.23", "serverIP": "128.137.125.168" }
Create a JSON artifact from the message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54758 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 55.44.58.23 serverIP: 128.137.125.168
Explain this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58914, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "166.123.111.187", "serverIP": "98.74.236.254" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58914 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 166.123.111.187 serverIP: 98.74.236.254
Explain this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58914, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "122.15.17.196", "serverIP": "161.101.53.240" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58914 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 122.15.17.196 serverIP: 161.101.53.240
Explain this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58914, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "11.152.189.22", "serverIP": "78.183.82.72" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58914 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 11.152.189.22 serverIP: 78.183.82.72
Explain this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1434, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58914, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "55.10.96.17", "serverIP": "183.63.61.94" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1434 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58914 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 55.10.96.17 serverIP: 183.63.61.94
Explain this syslog message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60602, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "109.160.182.216", "serverIP": "191.252.142.210" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60602 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 109.160.182.216 serverIP: 191.252.142.210
Explain this syslog message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60602, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "27.141.159.159", "serverIP": "109.191.82.12" }
Create a JSON artifact from the message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60602 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 27.141.159.159 serverIP: 109.191.82.12
Explain this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8036, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "225.140.10.57", "serverIP": "138.96.140.89" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8036 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 225.140.10.57 serverIP: 138.96.140.89
Explain this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8036, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "193.3.49.185", "serverIP": "169.232.153.107" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8036 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 193.3.49.185 serverIP: 169.232.153.107
Explain this syslog message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59270, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "85.110.165.220", "serverIP": "232.46.58.216" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59270 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 85.110.165.220 serverIP: 232.46.58.216
Explain this syslog message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59270, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "17.234.217.118", "serverIP": "135.230.77.146" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59270 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 17.234.217.118 serverIP: 135.230.77.146
Explain this syslog message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 500, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56759, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "107.46.188.177", "serverIP": "56.227.7.19" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 500 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56759 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 107.46.188.177 serverIP: 56.227.7.19
Explain this syslog message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 500, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56759, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "136.37.159.68", "serverIP": "60.151.240.204" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 500 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56759 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 136.37.159.68 serverIP: 60.151.240.204
Explain this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8036, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "154.4.211.192", "serverIP": "44.197.143.79" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message