input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35084,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.136.131.184",
"serverIP": "29.219.42.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
streamName: meraki
clientIP: 251.136.131.184
serverIP: 29.219.42.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35084,
"protocol": 6,
"streamName": "meraki",
"clientIP": "121.74.103.217",
"serverIP": "1.153.105.51"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
streamName: meraki
clientIP: 121.74.103.217
serverIP: 1.153.105.51 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49312,
"protocol": 6,
"streamName": "meraki",
"clientIP": "155.13.226.80",
"serverIP": "221.222.120.71"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
streamName: meraki
clientIP: 155.13.226.80
serverIP: 221.222.120.71 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49312,
"protocol": 6,
"streamName": "meraki",
"clientIP": "250.159.130.70",
"serverIP": "85.120.32.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
streamName: meraki
clientIP: 250.159.130.70
serverIP: 85.120.32.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37395,
"protocol": 6,
"streamName": "meraki",
"clientIP": "79.159.31.247",
"serverIP": "110.198.181.58"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
streamName: meraki
clientIP: 79.159.31.247
serverIP: 110.198.181.58 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37395,
"protocol": 6,
"streamName": "meraki",
"clientIP": "204.163.216.229",
"serverIP": "173.24.36.191"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
streamName: meraki
clientIP: 204.163.216.229
serverIP: 173.24.36.191 | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "197.47.245.5",
"serverIP": "100.118.141.210"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 197.47.245.5
serverIP: 100.118.141.210 | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "64.252.249.173",
"serverIP": "170.208.224.159"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 64.252.249.173
serverIP: 170.208.224.159 | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "215.193.231.196",
"serverIP": "188.74.35.80"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 215.193.231.196
serverIP: 188.74.35.80 | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "185.190.161.199",
"serverIP": "185.206.17.145"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 185.190.161.199
serverIP: 185.206.17.145 | Explain this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52609,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "244.241.34.209",
"serverIP": "182.132.226.12"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52609
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 244.241.34.209
serverIP: 182.132.226.12 | Explain this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52609,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "9.183.81.131",
"serverIP": "4.101.140.99"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52609
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 9.183.81.131
serverIP: 4.101.140.99 | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "247.136.19.69",
"serverIP": "188.86.108.149"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 247.136.19.69
serverIP: 188.86.108.149 | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.178.192.148",
"serverIP": "169.231.63.63"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.178.192.148
serverIP: 169.231.63.63 | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.245.202.28",
"serverIP": "71.190.184.183"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.245.202.28
serverIP: 71.190.184.183 | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "229.132.178.31",
"serverIP": "3.143.91.77"
} | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 229.132.178.31
serverIP: 3.143.91.77 | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "113.8.165.138",
"serverIP": "46.87.93.154"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 113.8.165.138
serverIP: 46.87.93.154 | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "199.236.72.12",
"serverIP": "184.211.203.108"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 199.236.72.12
serverIP: 184.211.203.108 | Explain this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.104.94.145",
"serverIP": "183.175.211.165"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 76.104.94.145
serverIP: 183.175.211.165 | Explain this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.5.157.140",
"serverIP": "67.132.157.38"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.5.157.140
serverIP: 67.132.157.38 | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "121.181.235.255",
"serverIP": "219.28.226.131"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 121.181.235.255
serverIP: 219.28.226.131 | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "103.197.237.12",
"serverIP": "64.249.234.188"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 103.197.237.12
serverIP: 64.249.234.188 | Explain this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51817,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "209.86.127.97",
"serverIP": "76.7.224.167"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51817
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 209.86.127.97
serverIP: 76.7.224.167 | Explain this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51817,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "205.124.37.180",
"serverIP": "132.67.241.55"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51817
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 205.124.37.180
serverIP: 132.67.241.55 | Explain this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46077,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.67.193.100",
"serverIP": "100.226.219.3"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46077
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.67.193.100
serverIP: 100.226.219.3 | Explain this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46077,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.95.211.237",
"serverIP": "195.242.166.148"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46077
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.95.211.237
serverIP: 195.242.166.148 | Explain this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51599,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "217.5.14.100",
"serverIP": "63.138.250.195"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51599
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 217.5.14.100
serverIP: 63.138.250.195 | Explain this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51599,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "1.141.146.202",
"serverIP": "224.17.21.242"
} | Create a JSON artifact from the message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51599
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 1.141.146.202
serverIP: 224.17.21.242 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "198.81.84.109",
"serverIP": "71.48.203.44"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 198.81.84.109
serverIP: 71.48.203.44 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "186.232.212.155",
"serverIP": "73.253.203.38"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 186.232.212.155
serverIP: 73.253.203.38 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.198.121.29",
"serverIP": "68.168.254.184"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 36.198.121.29
serverIP: 68.168.254.184 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "176.82.26.86",
"serverIP": "26.134.210.53"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 176.82.26.86
serverIP: 26.134.210.53 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.157.100.89",
"serverIP": "236.229.104.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
streamName: meraki
clientIP: 15.157.100.89
serverIP: 236.229.104.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "236.91.148.70",
"serverIP": "119.241.175.211"
} | Create a JSON artifact from the message |