input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 streamName: meraki clientIP: 236.91.148.70 serverIP: 119.241.175.211
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52721, "protocol": 6, "streamName": "meraki", "clientIP": "140.61.60.27", "serverIP": "151.106.125.104" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 streamName: meraki clientIP: 140.61.60.27 serverIP: 151.106.125.104
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52721, "protocol": 6, "streamName": "meraki", "clientIP": "110.217.170.90", "serverIP": "117.222.118.96" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 streamName: meraki clientIP: 110.217.170.90 serverIP: 117.222.118.96
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59362, "protocol": 6, "streamName": "meraki", "clientIP": "218.209.112.28", "serverIP": "125.199.149.176" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 streamName: meraki clientIP: 218.209.112.28 serverIP: 125.199.149.176
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59362, "protocol": 6, "streamName": "meraki", "clientIP": "107.41.92.135", "serverIP": "202.152.245.60" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 streamName: meraki clientIP: 107.41.92.135 serverIP: 202.152.245.60
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59362, "protocol": 6, "streamName": "meraki", "clientIP": "192.112.52.212", "serverIP": "163.250.180.86" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 streamName: meraki clientIP: 192.112.52.212 serverIP: 163.250.180.86
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59362, "protocol": 6, "streamName": "meraki", "clientIP": "200.155.181.18", "serverIP": "219.161.132.46" }
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 streamName: meraki clientIP: 200.155.181.18 serverIP: 219.161.132.46
Explain this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 50021, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group \"inside\" [0x9701e64b, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 50024, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "171.8.242.24", "serverIP": "70.177.27.17" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 50021 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 50024 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 16 streamName: cisco_asa clientIP: 171.8.242.24 serverIP: 70.177.27.17
Explain this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 50021, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group \"inside\" [0x9701e64b, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 50024, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "92.50.201.204", "serverIP": "106.75.210.212" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 50021 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 50024 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 16 streamName: cisco_asa clientIP: 92.50.201.204 serverIP: 106.75.210.212
Explain this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group \"inside\" [0xb9ad77a1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 62391, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "164.52.23.217", "serverIP": "75.218.141.239" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 7680 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 62391 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 164.52.23.217 serverIP: 75.218.141.239
Explain this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group \"inside\" [0xb9ad77a1, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 62391, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "162.124.242.221", "serverIP": "237.54.9.164" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 7680 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 62391 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 162.124.242.221 serverIP: 237.54.9.164
Explain this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 1853, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "message": "<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43637, "vendorcode": "ASA-5-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "62.43.223.228", "serverIP": "164.69.85.20" }
Create a JSON artifact from the message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 1853 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43637 vendorcode: ASA-5-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 62.43.223.228 serverIP: 164.69.85.20
Explain this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 1853, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "message": "<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 43637, "vendorcode": "ASA-5-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "5.59.80.74", "serverIP": "25.3.42.116" }
Create a JSON artifact from the message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 1853 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 43637 vendorcode: ASA-5-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 5.59.80.74 serverIP: 25.3.42.116
Explain this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
{ "priority": 174, "senderhost": "10.18.255.1", "serverport": 9997, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57898, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "123.73.110.229", "serverIP": "9.203.37.80" }
Create a JSON artifact from the message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.18.255.1 serverport: 9997 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57898 vendorcode: ASA-6-106100 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 123.73.110.229 serverIP: 9.203.37.80
Explain this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
{ "priority": 174, "senderhost": "10.18.255.1", "serverport": 9997, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 6, "sourceinfo": "unknown", "message": "<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 57898, "vendorcode": "ASA-6-106100", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_asa", "clientIP": "236.78.82.183", "serverIP": "120.62.31.17" }
Create a JSON artifact from the message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.18.255.1 serverport: 9997 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 6 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 57898 vendorcode: ASA-6-106100 action: block protocol: 6 facilitycode: 21 streamName: cisco_asa clientIP: 236.78.82.183 serverIP: 120.62.31.17
Explain this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "serverport": 9997, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "clientport": 58283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "26.176.59.111", "serverIP": "122.200.130.94" }
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 serverport: 9997 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action clientport: 58283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 23 streamName: cisco_asa clientIP: 26.176.59.111 serverIP: 122.200.130.94
Explain this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "serverport": 9997, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "clientport": 58283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "95.186.46.134", "serverIP": "189.201.40.113" }
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 serverport: 9997 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action clientport: 58283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 23 streamName: cisco_asa clientIP: 95.186.46.134 serverIP: 189.201.40.113
Explain this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
{ "priority": 132, "senderhost": "10.16.41.67", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group \"GLOBAL-IN\" [0xa4fd81ea, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 48978, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "127.3.227.110", "serverIP": "194.43.238.23" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.16.41.67 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 48978 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 16 streamName: cisco_asa clientIP: 127.3.227.110 serverIP: 194.43.238.23
Explain this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
{ "priority": 132, "senderhost": "10.16.41.67", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group \"GLOBAL-IN\" [0xa4fd81ea, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 48978, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "145.10.193.244", "serverIP": "137.188.154.36" }
Create a JSON artifact from the message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.16.41.67 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 48978 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 16 streamName: cisco_asa clientIP: 145.10.193.244 serverIP: 137.188.154.36
Explain this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 460, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "message": "<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 58064, "vendorcode": "ASA-5-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "142.157.33.100", "serverIP": "133.38.79.168" }
Create a JSON artifact from the message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 460 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 58064 vendorcode: ASA-5-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 142.157.33.100 serverIP: 133.38.79.168
Explain this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 460, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "message": "<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]\n", "sensitivity": "normal", "facilitylabel": "local0", "messagetype": "firewall_action", "clientport": 58064, "vendorcode": "ASA-5-106100", "action": "block", "protocol": 6, "facilitycode": 16, "streamName": "cisco_asa", "clientIP": "158.104.211.126", "serverIP": "226.243.129.166" }
Create a JSON artifact from the message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 460 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown sensitivity: normal facilitylabel: local0 messagetype: firewall_action clientport: 58064 vendorcode: ASA-5-106100 action: block protocol: 6 facilitycode: 16 streamName: cisco_asa clientIP: 158.104.211.126 serverIP: 226.243.129.166
Explain this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.80.23.147", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "clientport": 50889, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "56.49.17.196", "serverIP": "13.189.253.28" }
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.80.23.147 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action clientport: 50889 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 23 streamName: cisco_asa clientIP: 56.49.17.196 serverIP: 13.189.253.28
Explain this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.80.23.147", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group \"INSIDE_ACL\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local7", "messagetype": "firewall_action", "clientport": 50889, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 23, "streamName": "cisco_asa", "clientIP": "5.148.105.246", "serverIP": "159.40.77.231" }
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.80.23.147 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local7 messagetype: firewall_action clientport: 50889 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 23 streamName: cisco_asa clientIP: 5.148.105.246 serverIP: 159.40.77.231
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6688, "protocol": 6, "streamName": "meraki", "clientIP": "192.106.161.56", "serverIP": "87.31.250.110" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6688 protocol: 6 streamName: meraki clientIP: 192.106.161.56 serverIP: 87.31.250.110
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6688, "protocol": 6, "streamName": "meraki", "clientIP": "131.92.7.17", "serverIP": "125.100.187.57" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6688 protocol: 6 streamName: meraki clientIP: 131.92.7.17 serverIP: 125.100.187.57
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26974, "protocol": 6, "streamName": "meraki", "clientIP": "240.102.12.33", "serverIP": "25.20.221.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 streamName: meraki clientIP: 240.102.12.33 serverIP: 25.20.221.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26974, "protocol": 6, "streamName": "meraki", "clientIP": "84.38.125.107", "serverIP": "30.15.199.115" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 streamName: meraki clientIP: 84.38.125.107 serverIP: 30.15.199.115
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26974, "protocol": 6, "streamName": "meraki", "clientIP": "84.151.44.189", "serverIP": "233.178.157.35" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 streamName: meraki clientIP: 84.151.44.189 serverIP: 233.178.157.35
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26974, "protocol": 6, "streamName": "meraki", "clientIP": "107.148.151.188", "serverIP": "151.246.78.139" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 streamName: meraki clientIP: 107.148.151.188 serverIP: 151.246.78.139
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40063, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "34.113.211.14", "serverIP": "148.146.163.131" }
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40063 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 34.113.211.14 serverIP: 148.146.163.131
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40063, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "17.212.147.7", "serverIP": "7.5.45.145" }
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40063 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 17.212.147.7 serverIP: 7.5.45.145
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40063, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "146.11.48.9", "serverIP": "230.98.219.244" }
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40063 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 146.11.48.9 serverIP: 230.98.219.244
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40063, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "214.119.167.230", "serverIP": "91.160.255.72" }
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40063 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 214.119.167.230 serverIP: 91.160.255.72
Explain this syslog message
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31240, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "212.18.2.238", "serverIP": "112.33.252.103" }
Create a JSON artifact from the message
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message