input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 212.18.2.238
serverIP: 112.33.252.103 | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "71.163.201.178",
"serverIP": "163.60.42.6"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 71.163.201.178
serverIP: 163.60.42.6 | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "35.72.105.206",
"serverIP": "101.48.10.159"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 35.72.105.206
serverIP: 101.48.10.159 | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.71.220.97",
"serverIP": "223.218.34.51"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 150.71.220.97
serverIP: 223.218.34.51 | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "27.252.76.136",
"serverIP": "186.72.65.37"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 27.252.76.136
serverIP: 186.72.65.37 | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "127.79.103.161",
"serverIP": "241.28.51.187"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 127.79.103.161
serverIP: 241.28.51.187 | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "36.27.12.74",
"serverIP": "220.210.180.241"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 36.27.12.74
serverIP: 220.210.180.241 | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31240,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "202.190.101.157",
"serverIP": "99.12.98.108"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31240
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 202.190.101.157
serverIP: 99.12.98.108 | Explain this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58848,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "204.161.127.29",
"serverIP": "3.207.16.134"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58848
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 204.161.127.29
serverIP: 3.207.16.134 | Explain this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 58848,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.75.89.69",
"serverIP": "163.210.114.236"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 58848
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.75.89.69
serverIP: 163.210.114.236 | Explain this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5242,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38146,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "38.195.33.251",
"serverIP": "108.244.45.212"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5242
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38146
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 38.195.33.251
serverIP: 108.244.45.212 | Explain this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5242,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38146,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "164.176.75.62",
"serverIP": "33.94.158.91"
} | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5242
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38146
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 164.176.75.62
serverIP: 33.94.158.91 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15736,
"protocol": 6,
"streamName": "meraki",
"clientIP": "21.69.46.24",
"serverIP": "107.99.147.52"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
streamName: meraki
clientIP: 21.69.46.24
serverIP: 107.99.147.52 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15736,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.186.158.16",
"serverIP": "222.156.251.52"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
streamName: meraki
clientIP: 78.186.158.16
serverIP: 222.156.251.52 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15736,
"protocol": 6,
"streamName": "meraki",
"clientIP": "121.139.220.161",
"serverIP": "140.234.101.165"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
streamName: meraki
clientIP: 121.139.220.161
serverIP: 140.234.101.165 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15736,
"protocol": 6,
"streamName": "meraki",
"clientIP": "161.161.213.42",
"serverIP": "33.177.106.88"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
streamName: meraki
clientIP: 161.161.213.42
serverIP: 33.177.106.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60589,
"protocol": 6,
"streamName": "meraki",
"clientIP": "53.134.15.148",
"serverIP": "127.62.186.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
streamName: meraki
clientIP: 53.134.15.148
serverIP: 127.62.186.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60589,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.125.185.213",
"serverIP": "234.101.16.78"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
streamName: meraki
clientIP: 212.125.185.213
serverIP: 234.101.16.78 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60589,
"protocol": 6,
"streamName": "meraki",
"clientIP": "242.82.124.179",
"serverIP": "5.21.69.59"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
streamName: meraki
clientIP: 242.82.124.179
serverIP: 5.21.69.59 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60589,
"protocol": 6,
"streamName": "meraki",
"clientIP": "97.12.170.118",
"serverIP": "180.223.88.25"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
streamName: meraki
clientIP: 97.12.170.118
serverIP: 180.223.88.25 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 19919,
"protocol": 6,
"streamName": "meraki",
"clientIP": "82.73.92.238",
"serverIP": "61.93.127.95"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
streamName: meraki
clientIP: 82.73.92.238
serverIP: 61.93.127.95 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 19919,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.94.245.73",
"serverIP": "107.231.109.217"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
streamName: meraki
clientIP: 58.94.245.73
serverIP: 107.231.109.217 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 19919,
"protocol": 6,
"streamName": "meraki",
"clientIP": "153.214.4.200",
"serverIP": "19.235.54.214"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
streamName: meraki
clientIP: 153.214.4.200
serverIP: 19.235.54.214 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 19919,
"protocol": 6,
"streamName": "meraki",
"clientIP": "16.82.138.190",
"serverIP": "8.6.128.26"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
streamName: meraki
clientIP: 16.82.138.190
serverIP: 8.6.128.26 | Explain this syslog message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14636,
"protocol": 17,
"streamName": "meraki",
"clientIP": "196.182.198.26",
"serverIP": "5.246.186.245"
} | Create a JSON artifact from the message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
streamName: meraki
clientIP: 196.182.198.26
serverIP: 5.246.186.245 | Explain this syslog message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14636,
"protocol": 17,
"streamName": "meraki",
"clientIP": "33.76.107.194",
"serverIP": "40.159.209.157"
} | Create a JSON artifact from the message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
streamName: meraki
clientIP: 33.76.107.194
serverIP: 40.159.209.157 | Explain this syslog message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14636,
"protocol": 17,
"streamName": "meraki",
"clientIP": "187.44.72.154",
"serverIP": "146.56.42.2"
} | Create a JSON artifact from the message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
streamName: meraki
clientIP: 187.44.72.154
serverIP: 146.56.42.2 | Explain this syslog message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14636,
"protocol": 17,
"streamName": "meraki",
"clientIP": "255.241.69.196",
"serverIP": "58.87.247.162"
} | Create a JSON artifact from the message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
streamName: meraki
clientIP: 255.241.69.196
serverIP: 58.87.247.162 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50404,
"protocol": 6,
"streamName": "meraki",
"clientIP": "51.143.31.86",
"serverIP": "8.224.41.177"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
streamName: meraki
clientIP: 51.143.31.86
serverIP: 8.224.41.177 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50404,
"protocol": 6,
"streamName": "meraki",
"clientIP": "197.82.173.140",
"serverIP": "108.3.218.32"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
streamName: meraki
clientIP: 197.82.173.140
serverIP: 108.3.218.32 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50404,
"protocol": 6,
"streamName": "meraki",
"clientIP": "244.68.144.244",
"serverIP": "29.125.35.62"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
streamName: meraki
clientIP: 244.68.144.244
serverIP: 29.125.35.62 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50404,
"protocol": 6,
"streamName": "meraki",
"clientIP": "196.174.198.235",
"serverIP": "61.170.36.53"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
streamName: meraki
clientIP: 196.174.198.235
serverIP: 61.170.36.53 | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51430,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "234.201.121.194",
"serverIP": "173.209.23.164"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51430
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 234.201.121.194
serverIP: 173.209.23.164 | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51430,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.230.145.68",
"serverIP": "75.83.2.133"
} | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51430
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.230.145.68
serverIP: 75.83.2.133 | Explain this syslog message |