input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40804,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "32.21.203.10",
"serverIP": "63.102.157.88"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40804
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 32.21.203.10
serverIP: 63.102.157.88 | Explain this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40804,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "227.32.207.38",
"serverIP": "223.47.89.99"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40804
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 227.32.207.38
serverIP: 223.47.89.99 | Explain this syslog message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.12.203.210",
"serverIP": "56.184.219.114"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 20.12.203.210
serverIP: 56.184.219.114 | Explain this syslog message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "207.127.178.212",
"serverIP": "207.240.102.211"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 207.127.178.212
serverIP: 207.240.102.211 | Explain this syslog message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32839,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42470,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "43.65.162.48",
"serverIP": "114.66.47.100"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32839
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42470
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 43.65.162.48
serverIP: 114.66.47.100 | Explain this syslog message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32839,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42470,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "7.15.98.210",
"serverIP": "168.228.218.167"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32839
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42470
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 7.15.98.210
serverIP: 168.228.218.167 | Explain this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40804,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "145.183.91.198",
"serverIP": "9.116.42.6"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40804
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 145.183.91.198
serverIP: 9.116.42.6 | Explain this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40804,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.229.130.118",
"serverIP": "35.143.54.134"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40804
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.229.130.118
serverIP: 35.143.54.134 | Explain this syslog message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51235,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58503,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "22.48.46.255",
"serverIP": "54.30.21.180"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51235
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58503
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 22.48.46.255
serverIP: 54.30.21.180 | Explain this syslog message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 51235,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58503,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "206.239.38.104",
"serverIP": "243.145.111.89"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 51235
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58503
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 206.239.38.104
serverIP: 243.145.111.89 | Explain this syslog message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "198.41.157.150",
"serverIP": "122.200.103.9"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 198.41.157.150
serverIP: 122.200.103.9 | Explain this syslog message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.190.69.215",
"serverIP": "183.81.109.146"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 167.190.69.215
serverIP: 183.81.109.146 | Explain this syslog message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52203,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "56.231.185.247",
"serverIP": "113.28.12.57"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52203
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 56.231.185.247
serverIP: 113.28.12.57 | Explain this syslog message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52203,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "61.191.68.174",
"serverIP": "16.3.93.178"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52203
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 61.191.68.174
serverIP: 16.3.93.178 | Explain this syslog message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "253.154.95.239",
"serverIP": "72.146.33.248"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 253.154.95.239
serverIP: 72.146.33.248 | Explain this syslog message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50921,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "30.151.72.116",
"serverIP": "89.115.10.183"
} | Create a JSON artifact from the message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50921
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 30.151.72.116
serverIP: 89.115.10.183 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 25594,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.12.169.137",
"serverIP": "139.158.97.208"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 25594
protocol: 6
streamName: meraki
clientIP: 134.12.169.137
serverIP: 139.158.97.208 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 25594,
"protocol": 6,
"streamName": "meraki",
"clientIP": "80.55.239.225",
"serverIP": "240.158.242.242"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 25594
protocol: 6
streamName: meraki
clientIP: 80.55.239.225
serverIP: 240.158.242.242 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37188,
"protocol": 6,
"streamName": "meraki",
"clientIP": "122.243.30.84",
"serverIP": "28.15.210.95"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37188
protocol: 6
streamName: meraki
clientIP: 122.243.30.84
serverIP: 28.15.210.95 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37188,
"protocol": 6,
"streamName": "meraki",
"clientIP": "153.84.222.92",
"serverIP": "143.128.96.236"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37188
protocol: 6
streamName: meraki
clientIP: 153.84.222.92
serverIP: 143.128.96.236 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6678,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.60.225.44",
"serverIP": "121.179.54.225"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6678
protocol: 6
streamName: meraki
clientIP: 200.60.225.44
serverIP: 121.179.54.225 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6678,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.139.116.70",
"serverIP": "235.31.68.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6678
protocol: 6
streamName: meraki
clientIP: 240.139.116.70
serverIP: 235.31.68.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6678,
"protocol": 6,
"streamName": "meraki",
"clientIP": "254.177.20.134",
"serverIP": "78.248.110.194"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6678
protocol: 6
streamName: meraki
clientIP: 254.177.20.134
serverIP: 78.248.110.194 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6678,
"protocol": 6,
"streamName": "meraki",
"clientIP": "139.152.41.179",
"serverIP": "207.139.249.253"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6678
protocol: 6
streamName: meraki
clientIP: 139.152.41.179
serverIP: 207.139.249.253 | Explain this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50409,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "13.10.215.0",
"serverIP": "132.16.229.143"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50409
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 13.10.215.0
serverIP: 132.16.229.143 | Explain this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50409,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.178.47.153",
"serverIP": "88.9.253.54"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50409
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 35.178.47.153
serverIP: 88.9.253.54 | Explain this syslog message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54160,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "54.11.58.193",
"serverIP": "247.55.78.161"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54160
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 54.11.58.193
serverIP: 247.55.78.161 | Explain this syslog message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 1080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54160,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "116.58.115.151",
"serverIP": "42.23.230.47"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 1080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54160
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 116.58.115.151
serverIP: 42.23.230.47 | Explain this syslog message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26151,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "14.53.213.250",
"serverIP": "119.148.48.124"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26151
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 14.53.213.250
serverIP: 119.148.48.124 | Explain this syslog message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26151,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.50.211.48",
"serverIP": "198.82.13.40"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26151
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 38.50.211.48
serverIP: 198.82.13.40 | Explain this syslog message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3889,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52492,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "139.76.226.107",
"serverIP": "49.211.33.66"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3889
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52492
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 139.76.226.107
serverIP: 49.211.33.66 | Explain this syslog message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3889,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52492,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "170.218.230.25",
"serverIP": "0.236.198.48"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3889
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52492
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 170.218.230.25
serverIP: 0.236.198.48 | Explain this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50409,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.171.51.218",
"serverIP": "186.165.49.175"
} | Create a JSON artifact from the message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50409
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 167.171.51.218
serverIP: 186.165.49.175 | Explain this syslog message |
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50409,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "192.20.145.111",
"serverIP": "61.179.114.216"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.