input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40804, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "32.21.203.10", "serverIP": "63.102.157.88" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:32.21.203.10/40804 dst dmz-1:63.102.157.88/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40804 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 32.21.203.10 serverIP: 63.102.157.88
Explain this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40804, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "227.32.207.38", "serverIP": "223.47.89.99" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:227.32.207.38/40804 dst dmz-1:223.47.89.99/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40804 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 227.32.207.38 serverIP: 223.47.89.99
Explain this syslog message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.12.203.210", "serverIP": "56.184.219.114" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:20.12.203.210/50921 dst dmz-1:56.184.219.114/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 20.12.203.210 serverIP: 56.184.219.114
Explain this syslog message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "207.127.178.212", "serverIP": "207.240.102.211" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:03: %ASA-4-106023: Deny udp src outside:207.127.178.212/50921 dst dmz-1:207.240.102.211/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 207.127.178.212 serverIP: 207.240.102.211
Explain this syslog message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32839, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42470, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "43.65.162.48", "serverIP": "114.66.47.100" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:43.65.162.48/42470 dst dmz-1:114.66.47.100/32839 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32839 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42470 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 43.65.162.48 serverIP: 114.66.47.100
Explain this syslog message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32839, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42470, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "7.15.98.210", "serverIP": "168.228.218.167" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:09: %ASA-4-106023: Deny tcp src outside:7.15.98.210/42470 dst dmz-1:168.228.218.167/32839 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32839 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42470 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 7.15.98.210 serverIP: 168.228.218.167
Explain this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40804, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "145.183.91.198", "serverIP": "9.116.42.6" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:145.183.91.198/40804 dst dmz-1:9.116.42.6/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40804 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 145.183.91.198 serverIP: 9.116.42.6
Explain this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40804, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.229.130.118", "serverIP": "35.143.54.134" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:29: %ASA-4-106023: Deny tcp src outside:174.229.130.118/40804 dst dmz-1:35.143.54.134/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40804 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.229.130.118 serverIP: 35.143.54.134
Explain this syslog message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51235, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58503, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "22.48.46.255", "serverIP": "54.30.21.180" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:22.48.46.255/58503 dst dmz-1:54.30.21.180/51235 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51235 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58503 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 22.48.46.255 serverIP: 54.30.21.180
Explain this syslog message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 51235, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 58503, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "206.239.38.104", "serverIP": "243.145.111.89" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:32:45: %ASA-4-106023: Deny tcp src outside:206.239.38.104/58503 dst dmz-1:243.145.111.89/51235 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 51235 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 58503 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 206.239.38.104 serverIP: 243.145.111.89
Explain this syslog message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "198.41.157.150", "serverIP": "122.200.103.9" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:198.41.157.150/50921 dst dmz-1:122.200.103.9/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 198.41.157.150 serverIP: 122.200.103.9
Explain this syslog message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.190.69.215", "serverIP": "183.81.109.146" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:33:03: %ASA-4-106023: Deny udp src outside:167.190.69.215/50921 dst dmz-1:183.81.109.146/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 167.190.69.215 serverIP: 183.81.109.146
Explain this syslog message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52203, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "56.231.185.247", "serverIP": "113.28.12.57" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:56.231.185.247/52203 dst dmz-1:113.28.12.57/443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52203 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 56.231.185.247 serverIP: 113.28.12.57
Explain this syslog message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52203, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "61.191.68.174", "serverIP": "16.3.93.178" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:33:42: %ASA-4-106023: Deny tcp src outside:61.191.68.174/52203 dst dmz-1:16.3.93.178/443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52203 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 61.191.68.174 serverIP: 16.3.93.178
Explain this syslog message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "253.154.95.239", "serverIP": "72.146.33.248" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:253.154.95.239/50921 dst dmz-1:72.146.33.248/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 253.154.95.239 serverIP: 72.146.33.248
Explain this syslog message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50921, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "30.151.72.116", "serverIP": "89.115.10.183" }
Create a JSON artifact from the message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 14 2022 06:34:22: %ASA-4-106023: Deny udp src outside:30.151.72.116/50921 dst dmz-1:89.115.10.183/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50921 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 30.151.72.116 serverIP: 89.115.10.183
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 25594, "protocol": 6, "streamName": "meraki", "clientIP": "134.12.169.137", "serverIP": "139.158.97.208" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=134.12.169.137 dst=139.158.97.208 protocol=tcp sport=25594 dport=25 pattern: 1 dst 139.158.97.208
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 25594 protocol: 6 streamName: meraki clientIP: 134.12.169.137 serverIP: 139.158.97.208
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 25594, "protocol": 6, "streamName": "meraki", "clientIP": "80.55.239.225", "serverIP": "240.158.242.242" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.309389454 NORDC_MX400_1 flows src=80.55.239.225 dst=240.158.242.242 protocol=tcp sport=25594 dport=25 pattern: 1 dst 240.158.242.242
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 25594 protocol: 6 streamName: meraki clientIP: 80.55.239.225 serverIP: 240.158.242.242
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37188, "protocol": 6, "streamName": "meraki", "clientIP": "122.243.30.84", "serverIP": "28.15.210.95" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=122.243.30.84 dst=28.15.210.95 protocol=tcp sport=37188 dport=25 pattern: 1 dst 28.15.210.95
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37188 protocol: 6 streamName: meraki clientIP: 122.243.30.84 serverIP: 28.15.210.95
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37188, "protocol": 6, "streamName": "meraki", "clientIP": "153.84.222.92", "serverIP": "143.128.96.236" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.451371811 NORDC_MX400_1 flows src=153.84.222.92 dst=143.128.96.236 protocol=tcp sport=37188 dport=25 pattern: 1 dst 143.128.96.236
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37188 protocol: 6 streamName: meraki clientIP: 153.84.222.92 serverIP: 143.128.96.236
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6678, "protocol": 6, "streamName": "meraki", "clientIP": "200.60.225.44", "serverIP": "121.179.54.225" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=200.60.225.44 dst=121.179.54.225 protocol=tcp sport=6678 dport=25 pattern: 1 dst 121.179.54.225
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6678 protocol: 6 streamName: meraki clientIP: 200.60.225.44 serverIP: 121.179.54.225
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6678, "protocol": 6, "streamName": "meraki", "clientIP": "240.139.116.70", "serverIP": "235.31.68.196" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=240.139.116.70 dst=235.31.68.196 protocol=tcp sport=6678 dport=25 pattern: 1 dst 235.31.68.196
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6678 protocol: 6 streamName: meraki clientIP: 240.139.116.70 serverIP: 235.31.68.196
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6678, "protocol": 6, "streamName": "meraki", "clientIP": "254.177.20.134", "serverIP": "78.248.110.194" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=254.177.20.134 dst=78.248.110.194 protocol=tcp sport=6678 dport=25 pattern: 1 dst 78.248.110.194
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6678 protocol: 6 streamName: meraki clientIP: 254.177.20.134 serverIP: 78.248.110.194
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6678, "protocol": 6, "streamName": "meraki", "clientIP": "139.152.41.179", "serverIP": "207.139.249.253" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656367705.456189353 NORDC_MX400_1 flows src=139.152.41.179 dst=207.139.249.253 protocol=tcp sport=6678 dport=25 pattern: 1 dst 207.139.249.253
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6678 protocol: 6 streamName: meraki clientIP: 139.152.41.179 serverIP: 207.139.249.253
Explain this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50409, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "13.10.215.0", "serverIP": "132.16.229.143" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:13.10.215.0/50409 dst dmz-1:132.16.229.143/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50409 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 13.10.215.0 serverIP: 132.16.229.143
Explain this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50409, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "35.178.47.153", "serverIP": "88.9.253.54" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:35.178.47.153/50409 dst dmz-1:88.9.253.54/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50409 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 35.178.47.153 serverIP: 88.9.253.54
Explain this syslog message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54160, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "54.11.58.193", "serverIP": "247.55.78.161" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:54.11.58.193/54160 dst dmz-1:247.55.78.161/1080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54160 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 54.11.58.193 serverIP: 247.55.78.161
Explain this syslog message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 1080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54160, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "116.58.115.151", "serverIP": "42.23.230.47" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:54:54: %ASA-4-106023: Deny tcp src outside:116.58.115.151/54160 dst dmz-1:42.23.230.47/1080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 1080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54160 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 116.58.115.151 serverIP: 42.23.230.47
Explain this syslog message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "14.53.213.250", "serverIP": "119.148.48.124" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:14.53.213.250/26151 dst dmz-1:119.148.48.124/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 14.53.213.250 serverIP: 119.148.48.124
Explain this syslog message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "38.50.211.48", "serverIP": "198.82.13.40" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:38: %ASA-4-106023: Deny udp src outside:38.50.211.48/26151 dst dmz-1:198.82.13.40/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 38.50.211.48 serverIP: 198.82.13.40
Explain this syslog message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3889, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52492, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "139.76.226.107", "serverIP": "49.211.33.66" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:139.76.226.107/52492 dst dmz-1:49.211.33.66/3889 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3889 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52492 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 139.76.226.107 serverIP: 49.211.33.66
Explain this syslog message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3889, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52492, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "170.218.230.25", "serverIP": "0.236.198.48" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:40: %ASA-4-106023: Deny tcp src outside:170.218.230.25/52492 dst dmz-1:0.236.198.48/3889 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3889 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52492 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 170.218.230.25 serverIP: 0.236.198.48
Explain this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50409, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.171.51.218", "serverIP": "186.165.49.175" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:167.171.51.218/50409 dst dmz-1:186.165.49.175/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50409 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 167.171.51.218 serverIP: 186.165.49.175
Explain this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50409, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "192.20.145.111", "serverIP": "61.179.114.216" }
Create a JSON artifact from the message