input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
streamName: meraki
clientIP: 236.91.148.70
serverIP: 119.241.175.211 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "140.61.60.27",
"serverIP": "151.106.125.104"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
streamName: meraki
clientIP: 140.61.60.27
serverIP: 151.106.125.104 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "110.217.170.90",
"serverIP": "117.222.118.96"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
streamName: meraki
clientIP: 110.217.170.90
serverIP: 117.222.118.96 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59362,
"protocol": 6,
"streamName": "meraki",
"clientIP": "218.209.112.28",
"serverIP": "125.199.149.176"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
streamName: meraki
clientIP: 218.209.112.28
serverIP: 125.199.149.176 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59362,
"protocol": 6,
"streamName": "meraki",
"clientIP": "107.41.92.135",
"serverIP": "202.152.245.60"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
streamName: meraki
clientIP: 107.41.92.135
serverIP: 202.152.245.60 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59362,
"protocol": 6,
"streamName": "meraki",
"clientIP": "192.112.52.212",
"serverIP": "163.250.180.86"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
streamName: meraki
clientIP: 192.112.52.212
serverIP: 163.250.180.86 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59362,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.155.181.18",
"serverIP": "219.161.132.46"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
streamName: meraki
clientIP: 200.155.181.18
serverIP: 219.161.132.46 | Explain this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 50021,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group \"inside\" [0x9701e64b, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 50024,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "171.8.242.24",
"serverIP": "70.177.27.17"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 50021
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 50024
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 16
streamName: cisco_asa
clientIP: 171.8.242.24
serverIP: 70.177.27.17 | Explain this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 50021,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group \"inside\" [0x9701e64b, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 50024,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "92.50.201.204",
"serverIP": "106.75.210.212"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 50021
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 50024
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 16
streamName: cisco_asa
clientIP: 92.50.201.204
serverIP: 106.75.210.212 | Explain this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group \"inside\" [0xb9ad77a1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 62391,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "164.52.23.217",
"serverIP": "75.218.141.239"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 7680
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 62391
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 164.52.23.217
serverIP: 75.218.141.239 | Explain this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group \"inside\" [0xb9ad77a1, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 62391,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "162.124.242.221",
"serverIP": "237.54.9.164"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 7680
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 62391
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 162.124.242.221
serverIP: 237.54.9.164 | Explain this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 1853,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"message": "<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43637,
"vendorcode": "ASA-5-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "62.43.223.228",
"serverIP": "164.69.85.20"
} | Create a JSON artifact from the message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 1853
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43637
vendorcode: ASA-5-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 62.43.223.228
serverIP: 164.69.85.20 | Explain this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 1853,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"message": "<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 43637,
"vendorcode": "ASA-5-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "5.59.80.74",
"serverIP": "25.3.42.116"
} | Create a JSON artifact from the message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 1853
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 43637
vendorcode: ASA-5-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 5.59.80.74
serverIP: 25.3.42.116 | Explain this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| {
"priority": 174,
"senderhost": "10.18.255.1",
"serverport": 9997,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57898,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "123.73.110.229",
"serverIP": "9.203.37.80"
} | Create a JSON artifact from the message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.18.255.1
serverport: 9997
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57898
vendorcode: ASA-6-106100
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 123.73.110.229
serverIP: 9.203.37.80 | Explain this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| {
"priority": 174,
"senderhost": "10.18.255.1",
"serverport": 9997,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57898,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "236.78.82.183",
"serverIP": "120.62.31.17"
} | Create a JSON artifact from the message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.18.255.1
serverport: 9997
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57898
vendorcode: ASA-6-106100
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 236.78.82.183
serverIP: 120.62.31.17 | Explain this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"serverport": 9997,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"clientport": 58283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "26.176.59.111",
"serverIP": "122.200.130.94"
} | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
serverport: 9997
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
clientport: 58283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 23
streamName: cisco_asa
clientIP: 26.176.59.111
serverIP: 122.200.130.94 | Explain this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"serverport": 9997,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"clientport": 58283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "95.186.46.134",
"serverIP": "189.201.40.113"
} | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
serverport: 9997
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
clientport: 58283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 23
streamName: cisco_asa
clientIP: 95.186.46.134
serverIP: 189.201.40.113 | Explain this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| {
"priority": 132,
"senderhost": "10.16.41.67",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group \"GLOBAL-IN\" [0xa4fd81ea, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 48978,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "127.3.227.110",
"serverIP": "194.43.238.23"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.16.41.67
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 48978
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 16
streamName: cisco_asa
clientIP: 127.3.227.110
serverIP: 194.43.238.23 | Explain this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| {
"priority": 132,
"senderhost": "10.16.41.67",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group \"GLOBAL-IN\" [0xa4fd81ea, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 48978,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "145.10.193.244",
"serverIP": "137.188.154.36"
} | Create a JSON artifact from the message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.16.41.67
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 48978
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 16
streamName: cisco_asa
clientIP: 145.10.193.244
serverIP: 137.188.154.36 | Explain this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 460,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"message": "<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 58064,
"vendorcode": "ASA-5-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "142.157.33.100",
"serverIP": "133.38.79.168"
} | Create a JSON artifact from the message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 460
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 58064
vendorcode: ASA-5-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 142.157.33.100
serverIP: 133.38.79.168 | Explain this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 460,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"message": "<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n",
"sensitivity": "normal",
"facilitylabel": "local0",
"messagetype": "firewall_action",
"clientport": 58064,
"vendorcode": "ASA-5-106100",
"action": "block",
"protocol": 6,
"facilitycode": 16,
"streamName": "cisco_asa",
"clientIP": "158.104.211.126",
"serverIP": "226.243.129.166"
} | Create a JSON artifact from the message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 460
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown
sensitivity: normal
facilitylabel: local0
messagetype: firewall_action
clientport: 58064
vendorcode: ASA-5-106100
action: block
protocol: 6
facilitycode: 16
streamName: cisco_asa
clientIP: 158.104.211.126
serverIP: 226.243.129.166 | Explain this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.80.23.147",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"clientport": 50889,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "56.49.17.196",
"serverIP": "13.189.253.28"
} | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.80.23.147
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
clientport: 50889
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 23
streamName: cisco_asa
clientIP: 56.49.17.196
serverIP: 13.189.253.28 | Explain this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.80.23.147",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"clientport": 50889,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "5.148.105.246",
"serverIP": "159.40.77.231"
} | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.80.23.147
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
clientport: 50889
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 23
streamName: cisco_asa
clientIP: 5.148.105.246
serverIP: 159.40.77.231 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "192.106.161.56",
"serverIP": "87.31.250.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6688
protocol: 6
streamName: meraki
clientIP: 192.106.161.56
serverIP: 87.31.250.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.92.7.17",
"serverIP": "125.100.187.57"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6688
protocol: 6
streamName: meraki
clientIP: 131.92.7.17
serverIP: 125.100.187.57 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.102.12.33",
"serverIP": "25.20.221.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
streamName: meraki
clientIP: 240.102.12.33
serverIP: 25.20.221.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "84.38.125.107",
"serverIP": "30.15.199.115"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
streamName: meraki
clientIP: 84.38.125.107
serverIP: 30.15.199.115 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "84.151.44.189",
"serverIP": "233.178.157.35"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
streamName: meraki
clientIP: 84.151.44.189
serverIP: 233.178.157.35 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "107.148.151.188",
"serverIP": "151.246.78.139"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
streamName: meraki
clientIP: 107.148.151.188
serverIP: 151.246.78.139 | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40063,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "34.113.211.14",
"serverIP": "148.146.163.131"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40063
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 34.113.211.14
serverIP: 148.146.163.131 | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40063,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "17.212.147.7",
"serverIP": "7.5.45.145"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40063
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 17.212.147.7
serverIP: 7.5.45.145 | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40063,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "146.11.48.9",
"serverIP": "230.98.219.244"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40063
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 146.11.48.9
serverIP: 230.98.219.244 | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40063,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "214.119.167.230",
"serverIP": "91.160.255.72"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40063
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 214.119.167.230
serverIP: 91.160.255.72 | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "212.18.2.238",
"serverIP": "112.33.252.103"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |