input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26482
protocol: 6
streamName: meraki
clientIP: 206.161.99.183
serverIP: 24.12.58.184 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26482,
"protocol": 6,
"streamName": "meraki",
"clientIP": "43.194.131.87",
"serverIP": "22.99.143.38"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=43.194.131.87 dst=22.99.143.38 protocol=tcp sport=26482 dport=25 pattern: 1 dst 22.99.143.38 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26482
protocol: 6
streamName: meraki
clientIP: 43.194.131.87
serverIP: 22.99.143.38 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26482,
"protocol": 6,
"streamName": "meraki",
"clientIP": "52.101.217.54",
"serverIP": "174.26.127.35"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=52.101.217.54 dst=174.26.127.35 protocol=tcp sport=26482 dport=25 pattern: 1 dst 174.26.127.35 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26482
protocol: 6
streamName: meraki
clientIP: 52.101.217.54
serverIP: 174.26.127.35 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "76.7.116.8",
"serverIP": "84.133.104.90"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=76.7.116.8 dst=84.133.104.90 protocol=tcp sport=46688 dport=25 pattern: 1 dst 84.133.104.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
streamName: meraki
clientIP: 76.7.116.8
serverIP: 84.133.104.90 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.111.110.97",
"serverIP": "217.162.222.143"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.749609944 NORDC_MX400_1 flows src=246.111.110.97 dst=217.162.222.143 protocol=tcp sport=46688 dport=25 pattern: 1 dst 217.162.222.143 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
streamName: meraki
clientIP: 246.111.110.97
serverIP: 217.162.222.143 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30289,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.210.201.48",
"serverIP": "201.86.102.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=98.210.201.48 dst=201.86.102.80 protocol=tcp sport=30289 dport=25 pattern: 1 dst 201.86.102.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30289
protocol: 6
streamName: meraki
clientIP: 98.210.201.48
serverIP: 201.86.102.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30289,
"protocol": 6,
"streamName": "meraki",
"clientIP": "60.197.155.67",
"serverIP": "127.254.57.209"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.620519355 NORDC_MX400_1 flows src=60.197.155.67 dst=127.254.57.209 protocol=tcp sport=30289 dport=25 pattern: 1 dst 127.254.57.209 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30289
protocol: 6
streamName: meraki
clientIP: 60.197.155.67
serverIP: 127.254.57.209 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10052,
"protocol": 6,
"streamName": "meraki",
"clientIP": "235.95.141.145",
"serverIP": "156.91.125.79"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=235.95.141.145 dst=156.91.125.79 protocol=tcp sport=10052 dport=25 pattern: 1 dst 156.91.125.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10052
protocol: 6
streamName: meraki
clientIP: 235.95.141.145
serverIP: 156.91.125.79 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10052,
"protocol": 6,
"streamName": "meraki",
"clientIP": "141.9.187.35",
"serverIP": "163.119.19.206"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.754921568 NORDC_MX400_1 flows src=141.9.187.35 dst=163.119.19.206 protocol=tcp sport=10052 dport=25 pattern: 1 dst 163.119.19.206 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10052
protocol: 6
streamName: meraki
clientIP: 141.9.187.35
serverIP: 163.119.19.206 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.104.29.173",
"serverIP": "17.174.46.87"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=56.104.29.173 dst=17.174.46.87 protocol=tcp sport=32590 dport=25 pattern: 1 dst 17.174.46.87 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32590
protocol: 6
streamName: meraki
clientIP: 56.104.29.173
serverIP: 17.174.46.87 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "233.225.82.151",
"serverIP": "140.245.243.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759434839 NORDC_MX400_1 flows src=233.225.82.151 dst=140.245.243.177 protocol=tcp sport=32590 dport=25 pattern: 1 dst 140.245.243.177 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32590
protocol: 6
streamName: meraki
clientIP: 233.225.82.151
serverIP: 140.245.243.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "55.131.26.136",
"serverIP": "215.22.35.31"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=215.22.35.31 dst=55.131.26.136 protocol=udp sport=4104 dport=4104 pattern: 1 dst 55.131.26.136 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 55.131.26.136
serverIP: 215.22.35.31 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "196.165.127.96",
"serverIP": "178.220.227.49"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.759501239 NORDC_MX400_1 flows src=178.220.227.49 dst=196.165.127.96 protocol=udp sport=4104 dport=4104 pattern: 1 dst 196.165.127.96 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 196.165.127.96
serverIP: 178.220.227.49 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 18029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.90.39.7",
"serverIP": "133.97.145.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=172.90.39.7 dst=133.97.145.8 protocol=tcp sport=18029 dport=25 pattern: 1 dst 133.97.145.8 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 18029
protocol: 6
streamName: meraki
clientIP: 172.90.39.7
serverIP: 133.97.145.8 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 18029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "253.34.165.213",
"serverIP": "33.105.126.186"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.765938470 NORDC_MX400_1 flows src=253.34.165.213 dst=33.105.126.186 protocol=tcp sport=18029 dport=25 pattern: 1 dst 33.105.126.186 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 18029
protocol: 6
streamName: meraki
clientIP: 253.34.165.213
serverIP: 33.105.126.186 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27361,
"protocol": 6,
"streamName": "meraki",
"clientIP": "34.8.92.237",
"serverIP": "225.23.90.58"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=34.8.92.237 dst=225.23.90.58 protocol=tcp sport=27361 dport=25 pattern: 1 dst 225.23.90.58 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27361
protocol: 6
streamName: meraki
clientIP: 34.8.92.237
serverIP: 225.23.90.58 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27361,
"protocol": 6,
"streamName": "meraki",
"clientIP": "234.77.43.15",
"serverIP": "139.111.243.27"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123615.093211976 NORDC_MX400_1 flows src=234.77.43.15 dst=139.111.243.27 protocol=tcp sport=27361 dport=25 pattern: 1 dst 139.111.243.27 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27361
protocol: 6
streamName: meraki
clientIP: 234.77.43.15
serverIP: 139.111.243.27 | Explain this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.55.232.167",
"serverIP": "113.232.36.124"
} | Create a JSON artifact from the message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:76.55.232.167/54758 dst dmz-1:113.232.36.124/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 76.55.232.167
serverIP: 113.232.36.124 | Explain this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "70.70.147.62",
"serverIP": "58.229.175.214"
} | Create a JSON artifact from the message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:70.70.147.62/54758 dst dmz-1:58.229.175.214/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 70.70.147.62
serverIP: 58.229.175.214 | Explain this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "152.63.41.18",
"serverIP": "230.203.90.218"
} | Create a JSON artifact from the message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:152.63.41.18/54758 dst dmz-1:230.203.90.218/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 152.63.41.18
serverIP: 230.203.90.218 | Explain this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54758,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "55.44.58.23",
"serverIP": "128.137.125.168"
} | Create a JSON artifact from the message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 20 2023 03:08:23: %ASA-4-106023: Deny tcp src outside:55.44.58.23/54758 dst dmz-1:128.137.125.168/3389 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54758
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 55.44.58.23
serverIP: 128.137.125.168 | Explain this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "166.123.111.187",
"serverIP": "98.74.236.254"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:166.123.111.187/58914 dst dmz-1:98.74.236.254/1434 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 166.123.111.187
serverIP: 98.74.236.254 | Explain this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "122.15.17.196",
"serverIP": "161.101.53.240"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:122.15.17.196/58914 dst dmz-1:161.101.53.240/1434 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 122.15.17.196
serverIP: 161.101.53.240 | Explain this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.152.189.22",
"serverIP": "78.183.82.72"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:11.152.189.22/58914 dst dmz-1:78.183.82.72/1434 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.152.189.22
serverIP: 78.183.82.72 | Explain this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1434,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "55.10.96.17",
"serverIP": "183.63.61.94"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:51:01: %ASA-4-106023: Deny tcp src outside:55.10.96.17/58914 dst dmz-1:183.63.61.94/1434 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1434
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 55.10.96.17
serverIP: 183.63.61.94 | Explain this syslog message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60602,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "109.160.182.216",
"serverIP": "191.252.142.210"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:109.160.182.216/60602 dst dmz-1:191.252.142.210/7000 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60602
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 109.160.182.216
serverIP: 191.252.142.210 | Explain this syslog message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60602,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "27.141.159.159",
"serverIP": "109.191.82.12"
} | Create a JSON artifact from the message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 09 2022 17:50:58: %ASA-4-106023: Deny tcp src outside:27.141.159.159/60602 dst dmz-1:109.191.82.12/7000 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60602
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 27.141.159.159
serverIP: 109.191.82.12 | Explain this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8036,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "225.140.10.57",
"serverIP": "138.96.140.89"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:225.140.10.57/61953 dst dmz-1:138.96.140.89/8036 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8036
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 225.140.10.57
serverIP: 138.96.140.89 | Explain this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8036,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "193.3.49.185",
"serverIP": "169.232.153.107"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:193.3.49.185/61953 dst dmz-1:169.232.153.107/8036 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8036
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 193.3.49.185
serverIP: 169.232.153.107 | Explain this syslog message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59270,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "85.110.165.220",
"serverIP": "232.46.58.216"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:85.110.165.220/59270 dst dmz-1:232.46.58.216/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59270
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 85.110.165.220
serverIP: 232.46.58.216 | Explain this syslog message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59270,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "17.234.217.118",
"serverIP": "135.230.77.146"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:52:37: %ASA-4-106023: Deny tcp src outside:17.234.217.118/59270 dst dmz-1:135.230.77.146/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59270
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 17.234.217.118
serverIP: 135.230.77.146 | Explain this syslog message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 500,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56759,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "107.46.188.177",
"serverIP": "56.227.7.19"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:107.46.188.177/56759 dst dmz-1:56.227.7.19/500 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 500
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56759
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 107.46.188.177
serverIP: 56.227.7.19 | Explain this syslog message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 500,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56759,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "136.37.159.68",
"serverIP": "60.151.240.204"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:52:39: %ASA-4-106023: Deny udp src outside:136.37.159.68/56759 dst dmz-1:60.151.240.204/500 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 500
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56759
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 136.37.159.68
serverIP: 60.151.240.204 | Explain this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8036,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "154.4.211.192",
"serverIP": "44.197.143.79"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.