input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:154.4.211.192/61953 dst dmz-1:44.197.143.79/8036 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8036
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 154.4.211.192
serverIP: 44.197.143.79 | Explain this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8036,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "124.107.194.32",
"serverIP": "230.225.165.91"
} | Create a JSON artifact from the message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 09 2022 00:53:53: %ASA-4-106023: Deny tcp src outside:124.107.194.32/61953 dst dmz-1:230.225.165.91/8036 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8036
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 124.107.194.32
serverIP: 230.225.165.91 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50268,
"protocol": 6,
"streamName": "meraki",
"clientIP": "116.100.113.191",
"serverIP": "19.39.26.14"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=116.100.113.191 dst=19.39.26.14 protocol=tcp sport=50268 dport=80 pattern: 1 dst 19.39.26.14 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50268
protocol: 6
streamName: meraki
clientIP: 116.100.113.191
serverIP: 19.39.26.14 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50268,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.253.82.19",
"serverIP": "135.52.115.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.193450205 NORDC_MX400_1 flows src=45.253.82.19 dst=135.52.115.80 protocol=tcp sport=50268 dport=80 pattern: 1 dst 135.52.115.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50268
protocol: 6
streamName: meraki
clientIP: 45.253.82.19
serverIP: 135.52.115.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50269,
"protocol": 6,
"streamName": "meraki",
"clientIP": "82.50.174.225",
"serverIP": "20.133.169.20"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=82.50.174.225 dst=20.133.169.20 protocol=tcp sport=50269 dport=443 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50269
protocol: 6
streamName: meraki
clientIP: 82.50.174.225
serverIP: 20.133.169.20 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50269,
"protocol": 6,
"streamName": "meraki",
"clientIP": "109.93.104.242",
"serverIP": "43.91.1.29"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=109.93.104.242 dst=43.91.1.29 protocol=tcp sport=50269 dport=443 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50269
protocol: 6
streamName: meraki
clientIP: 109.93.104.242
serverIP: 43.91.1.29 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50269,
"protocol": 6,
"streamName": "meraki",
"clientIP": "59.118.240.162",
"serverIP": "86.202.88.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=59.118.240.162 dst=86.202.88.6 protocol=tcp sport=50269 dport=443 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50269
protocol: 6
streamName: meraki
clientIP: 59.118.240.162
serverIP: 86.202.88.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50269,
"protocol": 6,
"streamName": "meraki",
"clientIP": "39.2.173.163",
"serverIP": "61.147.164.86"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656018252.403967140 NORDC_MX400_1 flows src=39.2.173.163 dst=61.147.164.86 protocol=tcp sport=50269 dport=443 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50269
protocol: 6
streamName: meraki
clientIP: 39.2.173.163
serverIP: 61.147.164.86 | Explain this syslog message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9214,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11835,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.18.47.203",
"serverIP": "195.195.7.184"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:106.18.47.203/11835 dst dmz-1:195.195.7.184/9214 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9214
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11835
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.18.47.203
serverIP: 195.195.7.184 | Explain this syslog message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9214,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11835,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "37.164.72.239",
"serverIP": "159.52.21.141"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:05:34: %ASA-4-106023: Deny tcp src outside:37.164.72.239/11835 dst dmz-1:159.52.21.141/9214 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9214
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11835
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 37.164.72.239
serverIP: 159.52.21.141 | Explain this syslog message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36448,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "248.103.177.4",
"serverIP": "220.31.230.10"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:248.103.177.4/36448 dst dmz-1:220.31.230.10/8080 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36448
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 248.103.177.4
serverIP: 220.31.230.10 | Explain this syslog message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36448,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "101.79.211.30",
"serverIP": "121.165.235.143"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:05:47: %ASA-4-106023: Deny tcp src outside:101.79.211.30/36448 dst dmz-1:121.165.235.143/8080 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36448
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 101.79.211.30
serverIP: 121.165.235.143 | Explain this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48875,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.111.154.156",
"serverIP": "52.187.145.230"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:167.111.154.156/48875 dst dmz-1:52.187.145.230/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48875
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 167.111.154.156
serverIP: 52.187.145.230 | Explain this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48875,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "171.113.127.178",
"serverIP": "26.66.255.223"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:171.113.127.178/48875 dst dmz-1:26.66.255.223/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48875
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 171.113.127.178
serverIP: 26.66.255.223 | Explain this syslog message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34118,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56405,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "154.175.97.4",
"serverIP": "77.180.95.102"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:154.175.97.4/56405 dst dmz-1:77.180.95.102/34118 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34118
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56405
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 154.175.97.4
serverIP: 77.180.95.102 | Explain this syslog message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34118,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56405,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "70.40.247.145",
"serverIP": "157.99.207.86"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:30: %ASA-4-106023: Deny tcp src outside:70.40.247.145/56405 dst dmz-1:157.99.207.86/34118 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34118
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56405
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 70.40.247.145
serverIP: 157.99.207.86 | Explain this syslog message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3599,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59723,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "216.157.3.250",
"serverIP": "227.89.38.93"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:216.157.3.250/59723 dst dmz-1:227.89.38.93/3599 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3599
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59723
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 216.157.3.250
serverIP: 227.89.38.93 | Explain this syslog message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3599,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59723,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "165.238.251.10",
"serverIP": "8.239.76.240"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:56: %ASA-4-106023: Deny tcp src outside:165.238.251.10/59723 dst dmz-1:8.239.76.240/3599 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3599
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59723
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 165.238.251.10
serverIP: 8.239.76.240 | Explain this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48875,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "94.37.46.89",
"serverIP": "61.122.180.34"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:94.37.46.89/48875 dst dmz-1:61.122.180.34/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48875
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 94.37.46.89
serverIP: 61.122.180.34 | Explain this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48875,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "235.63.119.166",
"serverIP": "79.62.52.16"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:05: %ASA-4-106023: Deny tcp src outside:235.63.119.166/48875 dst dmz-1:79.62.52.16/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48875
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 235.63.119.166
serverIP: 79.62.52.16 | Explain this syslog message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37104,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.178.187.21",
"serverIP": "60.31.105.5"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:11.178.187.21/37104 dst dmz-1:60.31.105.5/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37104
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.178.187.21
serverIP: 60.31.105.5 | Explain this syslog message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5984,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 37104,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.178.111.7",
"serverIP": "124.128.96.138"
} | Create a JSON artifact from the message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 28 2022 19:06:35: %ASA-4-106023: Deny tcp src outside:119.178.111.7/37104 dst dmz-1:124.128.96.138/5984 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5984
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 37104
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.178.111.7
serverIP: 124.128.96.138 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48893,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.93.196.125",
"serverIP": "62.135.79.225"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=240.93.196.125 dst=62.135.79.225 protocol=tcp sport=48893 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48893
protocol: 6
streamName: meraki
clientIP: 240.93.196.125
serverIP: 62.135.79.225 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48893,
"protocol": 6,
"streamName": "meraki",
"clientIP": "23.88.9.65",
"serverIP": "181.180.17.146"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=23.88.9.65 dst=181.180.17.146 protocol=tcp sport=48893 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48893
protocol: 6
streamName: meraki
clientIP: 23.88.9.65
serverIP: 181.180.17.146 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48893,
"protocol": 6,
"streamName": "meraki",
"clientIP": "129.138.33.213",
"serverIP": "8.123.24.169"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=129.138.33.213 dst=8.123.24.169 protocol=tcp sport=48893 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48893
protocol: 6
streamName: meraki
clientIP: 129.138.33.213
serverIP: 8.123.24.169 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48893,
"protocol": 6,
"streamName": "meraki",
"clientIP": "232.90.204.224",
"serverIP": "76.157.236.227"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657872290.709147044 M36_MX67C_Athens flows src=232.90.204.224 dst=76.157.236.227 protocol=tcp sport=48893 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48893
protocol: 6
streamName: meraki
clientIP: 232.90.204.224
serverIP: 76.157.236.227 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 54822,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55781,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.70.188.242",
"serverIP": "133.16.28.70"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=96.70.188.242 dst=133.16.28.70 protocol=tcp sport=55781 dport=54822 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 54822
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55781
protocol: 6
streamName: meraki
clientIP: 96.70.188.242
serverIP: 133.16.28.70 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 54822,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55781,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.176.20.248",
"serverIP": "159.31.145.66"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=125.176.20.248 dst=159.31.145.66 protocol=tcp sport=55781 dport=54822 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 54822
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55781
protocol: 6
streamName: meraki
clientIP: 125.176.20.248
serverIP: 159.31.145.66 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 54822,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55781,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.164.82.30",
"serverIP": "201.186.220.178"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=200.164.82.30 dst=201.186.220.178 protocol=tcp sport=55781 dport=54822 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 54822
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55781
protocol: 6
streamName: meraki
clientIP: 200.164.82.30
serverIP: 201.186.220.178 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 54822,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55781,
"protocol": 6,
"streamName": "meraki",
"clientIP": "69.37.162.226",
"serverIP": "28.100.18.1"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1657871098.536859084 M36_MX67C_Athens flows src=69.37.162.226 dst=28.100.18.1 protocol=tcp sport=55781 dport=54822 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 54822
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55781
protocol: 6
streamName: meraki
clientIP: 69.37.162.226
serverIP: 28.100.18.1 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6378,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "232.153.200.124",
"serverIP": "242.65.209.110"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=232.153.200.124 dst=242.65.209.110 protocol=tcp sport=59968 dport=6378 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6378
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59968
protocol: 6
streamName: meraki
clientIP: 232.153.200.124
serverIP: 242.65.209.110 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6378,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "157.109.185.253",
"serverIP": "88.59.166.39"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=157.109.185.253 dst=88.59.166.39 protocol=tcp sport=59968 dport=6378 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6378
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59968
protocol: 6
streamName: meraki
clientIP: 157.109.185.253
serverIP: 88.59.166.39 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6378,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "95.105.33.48",
"serverIP": "231.248.30.14"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=95.105.33.48 dst=231.248.30.14 protocol=tcp sport=59968 dport=6378 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6378
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59968
protocol: 6
streamName: meraki
clientIP: 95.105.33.48
serverIP: 231.248.30.14 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6378,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "236.35.66.222",
"serverIP": "24.104.37.239"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657872316.119596192 M24_MX67C_ForestPark flows src=236.35.66.222 dst=24.104.37.239 protocol=tcp sport=59968 dport=6378 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6378
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59968
protocol: 6
streamName: meraki
clientIP: 236.35.66.222
serverIP: 24.104.37.239 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.