input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=46.119.5.106 dst=139.11.243.232 protocol=tcp sport=30357 dport=25 pattern: 1 dst 139.11.243.232 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30357
protocol: 6
streamName: meraki
clientIP: 46.119.5.106
serverIP: 139.11.243.232 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=254.238.92.189 dst=245.66.165.168 protocol=tcp sport=30357 dport=25 pattern: 1 dst 245.66.165.168 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=254.238.92.189 dst=245.66.165.168 protocol=tcp sport=30357 dport=25 pattern: 1 dst 245.66.165.168",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30357,
"protocol": 6,
"streamName": "meraki",
"clientIP": "254.238.92.189",
"serverIP": "245.66.165.168"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=254.238.92.189 dst=245.66.165.168 protocol=tcp sport=30357 dport=25 pattern: 1 dst 245.66.165.168 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=254.238.92.189 dst=245.66.165.168 protocol=tcp sport=30357 dport=25 pattern: 1 dst 245.66.165.168 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30357
protocol: 6
streamName: meraki
clientIP: 254.238.92.189
serverIP: 245.66.165.168 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=222.26.105.185 dst=164.96.78.109 protocol=tcp sport=14753 dport=25 pattern: 1 dst 164.96.78.109 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=222.26.105.185 dst=164.96.78.109 protocol=tcp sport=14753 dport=25 pattern: 1 dst 164.96.78.109",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14753,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.26.105.185",
"serverIP": "164.96.78.109"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=222.26.105.185 dst=164.96.78.109 protocol=tcp sport=14753 dport=25 pattern: 1 dst 164.96.78.109 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=222.26.105.185 dst=164.96.78.109 protocol=tcp sport=14753 dport=25 pattern: 1 dst 164.96.78.109 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14753
protocol: 6
streamName: meraki
clientIP: 222.26.105.185
serverIP: 164.96.78.109 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=161.200.199.8 dst=151.215.123.15 protocol=tcp sport=14753 dport=25 pattern: 1 dst 151.215.123.15 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=161.200.199.8 dst=151.215.123.15 protocol=tcp sport=14753 dport=25 pattern: 1 dst 151.215.123.15",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14753,
"protocol": 6,
"streamName": "meraki",
"clientIP": "161.200.199.8",
"serverIP": "151.215.123.15"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=161.200.199.8 dst=151.215.123.15 protocol=tcp sport=14753 dport=25 pattern: 1 dst 151.215.123.15 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=161.200.199.8 dst=151.215.123.15 protocol=tcp sport=14753 dport=25 pattern: 1 dst 151.215.123.15 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14753
protocol: 6
streamName: meraki
clientIP: 161.200.199.8
serverIP: 151.215.123.15 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=6.34.129.91 dst=40.194.242.192 protocol=tcp sport=63840 dport=25 pattern: 1 dst 40.194.242.192 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=6.34.129.91 dst=40.194.242.192 protocol=tcp sport=63840 dport=25 pattern: 1 dst 40.194.242.192",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63840,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.34.129.91",
"serverIP": "40.194.242.192"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=6.34.129.91 dst=40.194.242.192 protocol=tcp sport=63840 dport=25 pattern: 1 dst 40.194.242.192 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=6.34.129.91 dst=40.194.242.192 protocol=tcp sport=63840 dport=25 pattern: 1 dst 40.194.242.192 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63840
protocol: 6
streamName: meraki
clientIP: 6.34.129.91
serverIP: 40.194.242.192 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=35.14.189.16 dst=231.140.123.171 protocol=tcp sport=63840 dport=25 pattern: 1 dst 231.140.123.171 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=35.14.189.16 dst=231.140.123.171 protocol=tcp sport=63840 dport=25 pattern: 1 dst 231.140.123.171",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63840,
"protocol": 6,
"streamName": "meraki",
"clientIP": "35.14.189.16",
"serverIP": "231.140.123.171"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=35.14.189.16 dst=231.140.123.171 protocol=tcp sport=63840 dport=25 pattern: 1 dst 231.140.123.171 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.412885696 NORDC_MX400_1 flows src=35.14.189.16 dst=231.140.123.171 protocol=tcp sport=63840 dport=25 pattern: 1 dst 231.140.123.171 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63840
protocol: 6
streamName: meraki
clientIP: 35.14.189.16
serverIP: 231.140.123.171 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=255.33.47.245 dst=211.148.115.149 protocol=tcp sport=14753 dport=25 pattern: 1 dst 211.148.115.149 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=255.33.47.245 dst=211.148.115.149 protocol=tcp sport=14753 dport=25 pattern: 1 dst 211.148.115.149",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14753,
"protocol": 6,
"streamName": "meraki",
"clientIP": "255.33.47.245",
"serverIP": "211.148.115.149"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=255.33.47.245 dst=211.148.115.149 protocol=tcp sport=14753 dport=25 pattern: 1 dst 211.148.115.149 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=255.33.47.245 dst=211.148.115.149 protocol=tcp sport=14753 dport=25 pattern: 1 dst 211.148.115.149 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14753
protocol: 6
streamName: meraki
clientIP: 255.33.47.245
serverIP: 211.148.115.149 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=1.157.53.227 dst=77.192.49.105 protocol=tcp sport=14753 dport=25 pattern: 1 dst 77.192.49.105 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=1.157.53.227 dst=77.192.49.105 protocol=tcp sport=14753 dport=25 pattern: 1 dst 77.192.49.105",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14753,
"protocol": 6,
"streamName": "meraki",
"clientIP": "1.157.53.227",
"serverIP": "77.192.49.105"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=1.157.53.227 dst=77.192.49.105 protocol=tcp sport=14753 dport=25 pattern: 1 dst 77.192.49.105 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.414631591 NORDC_MX400_1 flows src=1.157.53.227 dst=77.192.49.105 protocol=tcp sport=14753 dport=25 pattern: 1 dst 77.192.49.105 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14753
protocol: 6
streamName: meraki
clientIP: 1.157.53.227
serverIP: 77.192.49.105 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=94.4.209.242 dst=26.199.23.76 protocol=tcp sport=24928 dport=25 pattern: 1 dst 26.199.23.76 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=94.4.209.242 dst=26.199.23.76 protocol=tcp sport=24928 dport=25 pattern: 1 dst 26.199.23.76",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24928,
"protocol": 6,
"streamName": "meraki",
"clientIP": "94.4.209.242",
"serverIP": "26.199.23.76"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=94.4.209.242 dst=26.199.23.76 protocol=tcp sport=24928 dport=25 pattern: 1 dst 26.199.23.76 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=94.4.209.242 dst=26.199.23.76 protocol=tcp sport=24928 dport=25 pattern: 1 dst 26.199.23.76 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24928
protocol: 6
streamName: meraki
clientIP: 94.4.209.242
serverIP: 26.199.23.76 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=9.180.54.53 dst=71.167.126.196 protocol=tcp sport=24928 dport=25 pattern: 1 dst 71.167.126.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=9.180.54.53 dst=71.167.126.196 protocol=tcp sport=24928 dport=25 pattern: 1 dst 71.167.126.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24928,
"protocol": 6,
"streamName": "meraki",
"clientIP": "9.180.54.53",
"serverIP": "71.167.126.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=9.180.54.53 dst=71.167.126.196 protocol=tcp sport=24928 dport=25 pattern: 1 dst 71.167.126.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.793150669 NORDC_MX400_1 flows src=9.180.54.53 dst=71.167.126.196 protocol=tcp sport=24928 dport=25 pattern: 1 dst 71.167.126.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24928
protocol: 6
streamName: meraki
clientIP: 9.180.54.53
serverIP: 71.167.126.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=185.40.129.218 dst=252.131.243.20 protocol=tcp sport=8764 dport=25 pattern: 1 dst 252.131.243.20 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=185.40.129.218 dst=252.131.243.20 protocol=tcp sport=8764 dport=25 pattern: 1 dst 252.131.243.20",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 8764,
"protocol": 6,
"streamName": "meraki",
"clientIP": "185.40.129.218",
"serverIP": "252.131.243.20"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=185.40.129.218 dst=252.131.243.20 protocol=tcp sport=8764 dport=25 pattern: 1 dst 252.131.243.20 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=185.40.129.218 dst=252.131.243.20 protocol=tcp sport=8764 dport=25 pattern: 1 dst 252.131.243.20 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 8764
protocol: 6
streamName: meraki
clientIP: 185.40.129.218
serverIP: 252.131.243.20 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=68.125.74.211 dst=124.225.69.219 protocol=tcp sport=8764 dport=25 pattern: 1 dst 124.225.69.219 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=68.125.74.211 dst=124.225.69.219 protocol=tcp sport=8764 dport=25 pattern: 1 dst 124.225.69.219",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 8764,
"protocol": 6,
"streamName": "meraki",
"clientIP": "68.125.74.211",
"serverIP": "124.225.69.219"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=68.125.74.211 dst=124.225.69.219 protocol=tcp sport=8764 dport=25 pattern: 1 dst 124.225.69.219 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746654.860627097 NORDC_MX400_1 flows src=68.125.74.211 dst=124.225.69.219 protocol=tcp sport=8764 dport=25 pattern: 1 dst 124.225.69.219 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 8764
protocol: 6
streamName: meraki
clientIP: 68.125.74.211
serverIP: 124.225.69.219 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=158.213.18.146 dst=246.107.68.109 protocol=tcp sport=27905 dport=25 pattern: 1 dst 246.107.68.109 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=158.213.18.146 dst=246.107.68.109 protocol=tcp sport=27905 dport=25 pattern: 1 dst 246.107.68.109",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27905,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.213.18.146",
"serverIP": "246.107.68.109"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=158.213.18.146 dst=246.107.68.109 protocol=tcp sport=27905 dport=25 pattern: 1 dst 246.107.68.109 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=158.213.18.146 dst=246.107.68.109 protocol=tcp sport=27905 dport=25 pattern: 1 dst 246.107.68.109 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27905
protocol: 6
streamName: meraki
clientIP: 158.213.18.146
serverIP: 246.107.68.109 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=55.96.176.159 dst=219.51.36.178 protocol=tcp sport=27905 dport=25 pattern: 1 dst 219.51.36.178 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=55.96.176.159 dst=219.51.36.178 protocol=tcp sport=27905 dport=25 pattern: 1 dst 219.51.36.178",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27905,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.96.176.159",
"serverIP": "219.51.36.178"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=55.96.176.159 dst=219.51.36.178 protocol=tcp sport=27905 dport=25 pattern: 1 dst 219.51.36.178 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.056005249 NORDC_MX400_1 flows src=55.96.176.159 dst=219.51.36.178 protocol=tcp sport=27905 dport=25 pattern: 1 dst 219.51.36.178 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27905
protocol: 6
streamName: meraki
clientIP: 55.96.176.159
serverIP: 219.51.36.178 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=248.83.24.93 dst=25.107.189.4 protocol=tcp sport=6304 dport=25 pattern: 1 dst 25.107.189.4 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=248.83.24.93 dst=25.107.189.4 protocol=tcp sport=6304 dport=25 pattern: 1 dst 25.107.189.4",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6304,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.83.24.93",
"serverIP": "25.107.189.4"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=248.83.24.93 dst=25.107.189.4 protocol=tcp sport=6304 dport=25 pattern: 1 dst 25.107.189.4 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=248.83.24.93 dst=25.107.189.4 protocol=tcp sport=6304 dport=25 pattern: 1 dst 25.107.189.4 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6304
protocol: 6
streamName: meraki
clientIP: 248.83.24.93
serverIP: 25.107.189.4 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=253.143.226.214 dst=170.53.176.144 protocol=tcp sport=6304 dport=25 pattern: 1 dst 170.53.176.144 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=253.143.226.214 dst=170.53.176.144 protocol=tcp sport=6304 dport=25 pattern: 1 dst 170.53.176.144",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6304,
"protocol": 6,
"streamName": "meraki",
"clientIP": "253.143.226.214",
"serverIP": "170.53.176.144"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=253.143.226.214 dst=170.53.176.144 protocol=tcp sport=6304 dport=25 pattern: 1 dst 170.53.176.144 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681746655.588522434 NORDC_MX400_1 flows src=253.143.226.214 dst=170.53.176.144 protocol=tcp sport=6304 dport=25 pattern: 1 dst 170.53.176.144 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6304
protocol: 6
streamName: meraki
clientIP: 253.143.226.214
serverIP: 170.53.176.144 | Explain this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:83.87.135.140/58914 dst dmz-1:21.95.188.192/3388 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3388,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:83.87.135.140/58914 dst dmz-1:21.95.188.192/3388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "83.87.135.140",
"serverIP": "21.95.188.192"
} | Create a JSON artifact from the message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:83.87.135.140/58914 dst dmz-1:21.95.188.192/3388 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:83.87.135.140/58914 dst dmz-1:21.95.188.192/3388 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3388
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 83.87.135.140
serverIP: 21.95.188.192 | Explain this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:87.117.245.102/58914 dst dmz-1:115.28.7.129/3388 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3388,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:87.117.245.102/58914 dst dmz-1:115.28.7.129/3388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "87.117.245.102",
"serverIP": "115.28.7.129"
} | Create a JSON artifact from the message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:87.117.245.102/58914 dst dmz-1:115.28.7.129/3388 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:87.117.245.102/58914 dst dmz-1:115.28.7.129/3388 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3388
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 87.117.245.102
serverIP: 115.28.7.129 | Explain this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:150.111.74.94/58914 dst dmz-1:183.228.226.236/3388 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3388,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:150.111.74.94/58914 dst dmz-1:183.228.226.236/3388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.111.74.94",
"serverIP": "183.228.226.236"
} | Create a JSON artifact from the message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:150.111.74.94/58914 dst dmz-1:183.228.226.236/3388 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:150.111.74.94/58914 dst dmz-1:183.228.226.236/3388 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3388
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 150.111.74.94
serverIP: 183.228.226.236 | Explain this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:47.248.128.1/58914 dst dmz-1:27.191.24.216/3388 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3388,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:47.248.128.1/58914 dst dmz-1:27.191.24.216/3388 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58914,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "47.248.128.1",
"serverIP": "27.191.24.216"
} | Create a JSON artifact from the message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:47.248.128.1/58914 dst dmz-1:27.191.24.216/3388 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Mar 11 2023 07:49:29: %ASA-4-106023: Deny tcp src outside:47.248.128.1/58914 dst dmz-1:27.191.24.216/3388 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3388
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58914
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 47.248.128.1
serverIP: 27.191.24.216 | Explain this syslog message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:32.163.13.210/58069 dst dmz-1:90.67.17.174/29503 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 29503,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:32.163.13.210/58069 dst dmz-1:90.67.17.174/29503 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58069,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.163.13.210",
"serverIP": "90.67.17.174"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:32.163.13.210/58069 dst dmz-1:90.67.17.174/29503 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:32.163.13.210/58069 dst dmz-1:90.67.17.174/29503 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 29503
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58069
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 32.163.13.210
serverIP: 90.67.17.174 | Explain this syslog message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:193.201.9.180/58069 dst dmz-1:55.111.233.142/29503 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 29503,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:193.201.9.180/58069 dst dmz-1:55.111.233.142/29503 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58069,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "193.201.9.180",
"serverIP": "55.111.233.142"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:193.201.9.180/58069 dst dmz-1:55.111.233.142/29503 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:14:55: %ASA-4-106023: Deny tcp src outside:193.201.9.180/58069 dst dmz-1:55.111.233.142/29503 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 29503
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58069
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 193.201.9.180
serverIP: 55.111.233.142 | Explain this syslog message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:39.136.36.140/43586 dst dmz-1:127.53.159.255/351 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 351,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:39.136.36.140/43586 dst dmz-1:127.53.159.255/351 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43586,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "39.136.36.140",
"serverIP": "127.53.159.255"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:39.136.36.140/43586 dst dmz-1:127.53.159.255/351 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:39.136.36.140/43586 dst dmz-1:127.53.159.255/351 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 351
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43586
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 39.136.36.140
serverIP: 127.53.159.255 | Explain this syslog message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:210.187.87.151/43586 dst dmz-1:118.16.31.252/351 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 351,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:210.187.87.151/43586 dst dmz-1:118.16.31.252/351 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43586,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "210.187.87.151",
"serverIP": "118.16.31.252"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:210.187.87.151/43586 dst dmz-1:118.16.31.252/351 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:07: %ASA-4-106023: Deny tcp src outside:210.187.87.151/43586 dst dmz-1:118.16.31.252/351 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 351
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43586
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 210.187.87.151
serverIP: 118.16.31.252 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:78.181.2.112/11187 dst dmz-1:4.214.27.19/10560 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10560,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:78.181.2.112/11187 dst dmz-1:4.214.27.19/10560 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "78.181.2.112",
"serverIP": "4.214.27.19"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:78.181.2.112/11187 dst dmz-1:4.214.27.19/10560 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:78.181.2.112/11187 dst dmz-1:4.214.27.19/10560 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10560
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 78.181.2.112
serverIP: 4.214.27.19 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:32.59.131.207/11187 dst dmz-1:126.37.114.177/10560 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10560,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:32.59.131.207/11187 dst dmz-1:126.37.114.177/10560 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.59.131.207",
"serverIP": "126.37.114.177"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:32.59.131.207/11187 dst dmz-1:126.37.114.177/10560 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:32.59.131.207/11187 dst dmz-1:126.37.114.177/10560 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10560
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 32.59.131.207
serverIP: 126.37.114.177 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:179.104.228.86/11187 dst dmz-1:131.70.44.159/5160 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5160,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:179.104.228.86/11187 dst dmz-1:131.70.44.159/5160 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "179.104.228.86",
"serverIP": "131.70.44.159"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:179.104.228.86/11187 dst dmz-1:131.70.44.159/5160 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:179.104.228.86/11187 dst dmz-1:131.70.44.159/5160 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5160
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 179.104.228.86
serverIP: 131.70.44.159 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:37.79.175.18/11187 dst dmz-1:164.242.8.196/5160 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5160,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:37.79.175.18/11187 dst dmz-1:164.242.8.196/5160 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "37.79.175.18",
"serverIP": "164.242.8.196"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:37.79.175.18/11187 dst dmz-1:164.242.8.196/5160 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:37.79.175.18/11187 dst dmz-1:164.242.8.196/5160 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5160
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 37.79.175.18
serverIP: 164.242.8.196 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:39.130.254.134/11187 dst dmz-1:86.128.146.4/10560 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10560,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:39.130.254.134/11187 dst dmz-1:86.128.146.4/10560 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "39.130.254.134",
"serverIP": "86.128.146.4"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:39.130.254.134/11187 dst dmz-1:86.128.146.4/10560 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:39.130.254.134/11187 dst dmz-1:86.128.146.4/10560 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10560
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 39.130.254.134
serverIP: 86.128.146.4 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:119.52.246.21/11187 dst dmz-1:72.207.123.211/10560 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10560,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:119.52.246.21/11187 dst dmz-1:72.207.123.211/10560 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.52.246.21",
"serverIP": "72.207.123.211"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:119.52.246.21/11187 dst dmz-1:72.207.123.211/10560 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:119.52.246.21/11187 dst dmz-1:72.207.123.211/10560 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10560
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 119.52.246.21
serverIP: 72.207.123.211 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:242.189.164.9/11187 dst dmz-1:6.223.107.204/5160 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5160,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:242.189.164.9/11187 dst dmz-1:6.223.107.204/5160 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "242.189.164.9",
"serverIP": "6.223.107.204"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:242.189.164.9/11187 dst dmz-1:6.223.107.204/5160 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:242.189.164.9/11187 dst dmz-1:6.223.107.204/5160 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5160
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 242.189.164.9
serverIP: 6.223.107.204 | Explain this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:112.200.99.196/11187 dst dmz-1:21.135.219.239/5160 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5160,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:112.200.99.196/11187 dst dmz-1:21.135.219.239/5160 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 11187,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "112.200.99.196",
"serverIP": "21.135.219.239"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:112.200.99.196/11187 dst dmz-1:21.135.219.239/5160 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:09: %ASA-4-106023: Deny udp src outside:112.200.99.196/11187 dst dmz-1:21.135.219.239/5160 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5160
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 11187
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 112.200.99.196
serverIP: 21.135.219.239 | Explain this syslog message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:221.255.44.14/11187 dst dmz-1:83.65.46.233/52976 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11187,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:221.255.44.14/11187 dst dmz-1:83.65.46.233/52976 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "83.65.46.233",
"serverIP": "221.255.44.14"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:221.255.44.14/11187 dst dmz-1:83.65.46.233/52976 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:221.255.44.14/11187 dst dmz-1:83.65.46.233/52976 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11187
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52976
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 83.65.46.233
serverIP: 221.255.44.14 | Explain this syslog message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:248.179.44.47/11187 dst dmz-1:244.156.19.70/52976 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 11187,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:248.179.44.47/11187 dst dmz-1:244.156.19.70/52976 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "244.156.19.70",
"serverIP": "248.179.44.47"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:248.179.44.47/11187 dst dmz-1:244.156.19.70/52976 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 05:15:11: %ASA-4-106023: Deny udp src outside:248.179.44.47/11187 dst dmz-1:244.156.19.70/52976 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 11187
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52976
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 244.156.19.70
serverIP: 248.179.44.47 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.