input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8036 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 154.4.211.192 serverIP: 44.197.143.79
Explain this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8036, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "124.107.194.32", "serverIP": "230.225.165.91" }
Create a JSON artifact from the message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8036 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 124.107.194.32 serverIP: 230.225.165.91
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50268, "protocol": 6, "streamName": "meraki", "clientIP": "116.100.113.191", "serverIP": "19.39.26.14" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50268 protocol: 6 streamName: meraki clientIP: 116.100.113.191 serverIP: 19.39.26.14
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50268, "protocol": 6, "streamName": "meraki", "clientIP": "45.253.82.19", "serverIP": "135.52.115.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50268 protocol: 6 streamName: meraki clientIP: 45.253.82.19 serverIP: 135.52.115.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50269, "protocol": 6, "streamName": "meraki", "clientIP": "82.50.174.225", "serverIP": "20.133.169.20" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 443 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50269 protocol: 6 streamName: meraki clientIP: 82.50.174.225 serverIP: 20.133.169.20
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50269, "protocol": 6, "streamName": "meraki", "clientIP": "109.93.104.242", "serverIP": "43.91.1.29" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 443 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50269 protocol: 6 streamName: meraki clientIP: 109.93.104.242 serverIP: 43.91.1.29
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50269, "protocol": 6, "streamName": "meraki", "clientIP": "59.118.240.162", "serverIP": "86.202.88.6" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 443 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50269 protocol: 6 streamName: meraki clientIP: 59.118.240.162 serverIP: 86.202.88.6
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50269, "protocol": 6, "streamName": "meraki", "clientIP": "39.2.173.163", "serverIP": "61.147.164.86" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 443 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50269 protocol: 6 streamName: meraki clientIP: 39.2.173.163 serverIP: 61.147.164.86
Explain this syslog message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9214, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11835, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "106.18.47.203", "serverIP": "195.195.7.184" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9214 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11835 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 106.18.47.203 serverIP: 195.195.7.184
Explain this syslog message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9214, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 11835, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "37.164.72.239", "serverIP": "159.52.21.141" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9214 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 11835 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 37.164.72.239 serverIP: 159.52.21.141
Explain this syslog message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36448, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "248.103.177.4", "serverIP": "220.31.230.10" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36448 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 248.103.177.4 serverIP: 220.31.230.10
Explain this syslog message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36448, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "101.79.211.30", "serverIP": "121.165.235.143" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36448 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 101.79.211.30 serverIP: 121.165.235.143
Explain this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48875, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.111.154.156", "serverIP": "52.187.145.230" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48875 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 167.111.154.156 serverIP: 52.187.145.230
Explain this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48875, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "171.113.127.178", "serverIP": "26.66.255.223" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48875 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 171.113.127.178 serverIP: 26.66.255.223
Explain this syslog message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34118, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56405, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "154.175.97.4", "serverIP": "77.180.95.102" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34118 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56405 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 154.175.97.4 serverIP: 77.180.95.102
Explain this syslog message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34118, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56405, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "70.40.247.145", "serverIP": "157.99.207.86" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34118 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56405 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 70.40.247.145 serverIP: 157.99.207.86
Explain this syslog message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3599, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59723, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "216.157.3.250", "serverIP": "227.89.38.93" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3599 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59723 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 216.157.3.250 serverIP: 227.89.38.93
Explain this syslog message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3599, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59723, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "165.238.251.10", "serverIP": "8.239.76.240" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3599 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59723 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 165.238.251.10 serverIP: 8.239.76.240
Explain this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48875, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "94.37.46.89", "serverIP": "61.122.180.34" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48875 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 94.37.46.89 serverIP: 61.122.180.34
Explain this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48875, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "235.63.119.166", "serverIP": "79.62.52.16" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48875 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 235.63.119.166 serverIP: 79.62.52.16
Explain this syslog message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37104, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "11.178.187.21", "serverIP": "60.31.105.5" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37104 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 11.178.187.21 serverIP: 60.31.105.5
Explain this syslog message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5984, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 37104, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.178.111.7", "serverIP": "124.128.96.138" }
Create a JSON artifact from the message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5984 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 37104 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.178.111.7 serverIP: 124.128.96.138
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48893, "protocol": 6, "streamName": "meraki", "clientIP": "240.93.196.125", "serverIP": "62.135.79.225" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48893 protocol: 6 streamName: meraki clientIP: 240.93.196.125 serverIP: 62.135.79.225
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48893, "protocol": 6, "streamName": "meraki", "clientIP": "23.88.9.65", "serverIP": "181.180.17.146" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48893 protocol: 6 streamName: meraki clientIP: 23.88.9.65 serverIP: 181.180.17.146
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48893, "protocol": 6, "streamName": "meraki", "clientIP": "129.138.33.213", "serverIP": "8.123.24.169" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48893 protocol: 6 streamName: meraki clientIP: 129.138.33.213 serverIP: 8.123.24.169
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48893, "protocol": 6, "streamName": "meraki", "clientIP": "232.90.204.224", "serverIP": "76.157.236.227" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48893 protocol: 6 streamName: meraki clientIP: 232.90.204.224 serverIP: 76.157.236.227
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 54822, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 55781, "protocol": 6, "streamName": "meraki", "clientIP": "96.70.188.242", "serverIP": "133.16.28.70" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 54822 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 55781 protocol: 6 streamName: meraki clientIP: 96.70.188.242 serverIP: 133.16.28.70
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 54822, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 55781, "protocol": 6, "streamName": "meraki", "clientIP": "125.176.20.248", "serverIP": "159.31.145.66" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 54822 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 55781 protocol: 6 streamName: meraki clientIP: 125.176.20.248 serverIP: 159.31.145.66
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 54822, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 55781, "protocol": 6, "streamName": "meraki", "clientIP": "200.164.82.30", "serverIP": "201.186.220.178" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 54822 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 55781 protocol: 6 streamName: meraki clientIP: 200.164.82.30 serverIP: 201.186.220.178
Explain this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 54822, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 55781, "protocol": 6, "streamName": "meraki", "clientIP": "69.37.162.226", "serverIP": "28.100.18.1" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 54822 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 55781 protocol: 6 streamName: meraki clientIP: 69.37.162.226 serverIP: 28.100.18.1
Explain this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6378, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59968, "protocol": 6, "streamName": "meraki", "clientIP": "232.153.200.124", "serverIP": "242.65.209.110" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6378 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59968 protocol: 6 streamName: meraki clientIP: 232.153.200.124 serverIP: 242.65.209.110
Explain this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6378, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59968, "protocol": 6, "streamName": "meraki", "clientIP": "157.109.185.253", "serverIP": "88.59.166.39" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6378 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59968 protocol: 6 streamName: meraki clientIP: 157.109.185.253 serverIP: 88.59.166.39
Explain this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6378, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59968, "protocol": 6, "streamName": "meraki", "clientIP": "95.105.33.48", "serverIP": "231.248.30.14" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6378 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59968 protocol: 6 streamName: meraki clientIP: 95.105.33.48 serverIP: 231.248.30.14
Explain this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6378, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59968, "protocol": 6, "streamName": "meraki", "clientIP": "236.35.66.222", "serverIP": "24.104.37.239" }
Create a JSON artifact from the message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6378 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59968 protocol: 6 streamName: meraki clientIP: 236.35.66.222 serverIP: 24.104.37.239
Explain this syslog message