input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40666, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.252.144.55", "serverIP": "177.123.185.94" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40666 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.252.144.55 serverIP: 177.123.185.94
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40666, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "176.248.189.245", "serverIP": "52.59.46.193" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40666 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 176.248.189.245 serverIP: 52.59.46.193
Explain this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3478, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54622, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "252.245.129.15", "serverIP": "207.130.83.24" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3478 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54622 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 252.245.129.15 serverIP: 207.130.83.24
Explain this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3478, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54622, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "57.186.181.7", "serverIP": "227.0.57.135" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3478 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54622 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 57.186.181.7 serverIP: 227.0.57.135
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40666, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "228.165.226.37", "serverIP": "154.20.142.128" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40666 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 228.165.226.37 serverIP: 154.20.142.128
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40666, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "127.70.122.244", "serverIP": "250.189.197.71" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40666 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 127.70.122.244 serverIP: 250.189.197.71
Explain this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43395, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52143, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "160.129.44.68", "serverIP": "220.203.181.57" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43395 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52143 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 160.129.44.68 serverIP: 220.203.181.57
Explain this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43395, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52143, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "171.5.38.74", "serverIP": "66.103.243.133" }
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43395 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52143 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 171.5.38.74 serverIP: 66.103.243.133
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13645, "protocol": 6, "streamName": "meraki", "clientIP": "218.194.30.114", "serverIP": "46.108.90.31" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 streamName: meraki clientIP: 218.194.30.114 serverIP: 46.108.90.31
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13645, "protocol": 6, "streamName": "meraki", "clientIP": "130.93.23.60", "serverIP": "50.223.52.13" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 streamName: meraki clientIP: 130.93.23.60 serverIP: 50.223.52.13
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61782, "protocol": 6, "streamName": "meraki", "clientIP": "115.241.14.64", "serverIP": "49.201.238.56" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61782 protocol: 6 streamName: meraki clientIP: 115.241.14.64 serverIP: 49.201.238.56
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61782, "protocol": 6, "streamName": "meraki", "clientIP": "157.62.166.0", "serverIP": "250.8.90.121" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61782 protocol: 6 streamName: meraki clientIP: 157.62.166.0 serverIP: 250.8.90.121
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33632, "protocol": 6, "streamName": "meraki", "clientIP": "56.62.145.28", "serverIP": "183.83.11.119" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33632 protocol: 6 streamName: meraki clientIP: 56.62.145.28 serverIP: 183.83.11.119
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33632, "protocol": 6, "streamName": "meraki", "clientIP": "183.126.136.202", "serverIP": "229.148.133.202" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33632 protocol: 6 streamName: meraki clientIP: 183.126.136.202 serverIP: 229.148.133.202
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6580, "protocol": 6, "streamName": "meraki", "clientIP": "109.234.208.0", "serverIP": "92.250.60.106" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6580 protocol: 6 streamName: meraki clientIP: 109.234.208.0 serverIP: 92.250.60.106
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6580, "protocol": 6, "streamName": "meraki", "clientIP": "223.100.224.126", "serverIP": "103.51.146.249" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6580 protocol: 6 streamName: meraki clientIP: 223.100.224.126 serverIP: 103.51.146.249
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13645, "protocol": 6, "streamName": "meraki", "clientIP": "128.127.165.125", "serverIP": "187.232.181.32" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 streamName: meraki clientIP: 128.127.165.125 serverIP: 187.232.181.32
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13645, "protocol": 6, "streamName": "meraki", "clientIP": "6.219.6.157", "serverIP": "116.73.8.128" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 streamName: meraki clientIP: 6.219.6.157 serverIP: 116.73.8.128
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5856, "protocol": 6, "streamName": "meraki", "clientIP": "107.162.230.205", "serverIP": "215.39.244.121" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5856 protocol: 6 streamName: meraki clientIP: 107.162.230.205 serverIP: 215.39.244.121
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5856, "protocol": 6, "streamName": "meraki", "clientIP": "230.185.152.9", "serverIP": "145.188.172.132" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5856 protocol: 6 streamName: meraki clientIP: 230.185.152.9 serverIP: 145.188.172.132
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 16001, "protocol": 6, "streamName": "meraki", "clientIP": "113.156.162.7", "serverIP": "203.64.252.233" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 16001 protocol: 6 streamName: meraki clientIP: 113.156.162.7 serverIP: 203.64.252.233
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 16001, "protocol": 6, "streamName": "meraki", "clientIP": "204.153.145.227", "serverIP": "231.3.221.148" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 16001 protocol: 6 streamName: meraki clientIP: 204.153.145.227 serverIP: 231.3.221.148
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,", "action": "block", "localstarttime": "Apr 16 02:53:39", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 35890, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "14.227.3.36", "serverIP": "32.166.204.37" }
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 16 02:53:39 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 35890 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 14.227.3.36 serverIP: 32.166.204.37
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,", "action": "block", "localstarttime": "Apr 16 02:53:39", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 35890, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "174.135.41.109", "serverIP": "237.5.218.131" }
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 16 02:53:39 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 35890 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 174.135.41.109 serverIP: 237.5.218.131
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,", "action": "block", "localstarttime": "Apr 16 02:53:39", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 35890, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "157.17.253.91", "serverIP": "223.160.123.114" }
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 16 02:53:39 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 35890 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 157.17.253.91 serverIP: 223.160.123.114
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,", "action": "block", "localstarttime": "Apr 16 02:53:39", "sensitivity": "normal", "application": "not-applicable", "localhostname": "DC1-PA3220-1", "priority": 14, "clientpackets": 1, "totalbytes": 60, "facilitylabel": "user-level", "messagetype": "traffic_drop", "clientport": 35890, "protocol": 6, "facilitycode": 1, "clientbytes": 60, "streamName": "pan_firewall", "clientIP": "14.33.133.107", "serverIP": "132.98.230.120" }
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unknown action: block localstarttime: Apr 16 02:53:39 sensitivity: normal application: not-applicable localhostname: DC1-PA3220-1 priority: 14 clientpackets: 1 totalbytes: 60 facilitylabel: user-level messagetype: traffic_drop clientport: 35890 protocol: 6 facilitycode: 1 clientbytes: 60 streamName: pan_firewall clientIP: 14.33.133.107 serverIP: 132.98.230.120
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57367, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 17, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "215.137.188.170", "serverIP": "121.44.54.105" }
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57367 vendorcode: ASA-6-106100 action: block protocol: 17 facilitycode: 21 streamName: cisco_asa clientIP: 215.137.188.170 serverIP: 121.44.54.105
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57367, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 17, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "30.143.211.147", "serverIP": "17.48.19.215" }
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57367 vendorcode: ASA-6-106100 action: block protocol: 17 facilitycode: 21 streamName: cisco_asa clientIP: 30.143.211.147 serverIP: 17.48.19.215
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57367, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 17, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "215.13.22.79", "serverIP": "199.62.156.176" }
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57367 vendorcode: ASA-6-106100 action: block protocol: 17 facilitycode: 21 streamName: cisco_asa clientIP: 215.13.22.79 serverIP: 199.62.156.176
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57367, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 17, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "94.161.144.165", "serverIP": "81.79.229.136" }
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57367 vendorcode: ASA-6-106100 action: block protocol: 17 facilitycode: 21 streamName: cisco_asa clientIP: 94.161.144.165 serverIP: 81.79.229.136
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "158.130.59.231", "serverIP": "141.15.208.219" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 158.130.59.231 serverIP: 141.15.208.219
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "87.129.127.5", "serverIP": "99.50.35.172" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 87.129.127.5 serverIP: 99.50.35.172
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "238.170.57.132", "serverIP": "121.74.231.28" }
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 56949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 238.170.57.132 serverIP: 121.74.231.28
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group \"inside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 56949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "129.103.152.219", "serverIP": "10.187.22.130" }
Create a JSON artifact from the message