input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35084,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.136.131.184",
"serverIP": "29.219.42.80"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
streamName: meraki
clientIP: 251.136.131.184
serverIP: 29.219.42.80
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35084,
"protocol": 6,
"streamName": "meraki",
"clientIP": "121.74.103.217",
"serverIP": "1.153.105.51"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
streamName: meraki
clientIP: 121.74.103.217
serverIP: 1.153.105.51
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49312,
"protocol": 6,
"streamName": "meraki",
"clientIP": "155.13.226.80",
"serverIP": "221.222.120.71"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
streamName: meraki
clientIP: 155.13.226.80
serverIP: 221.222.120.71
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49312,
"protocol": 6,
"streamName": "meraki",
"clientIP": "250.159.130.70",
"serverIP": "85.120.32.129"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
streamName: meraki
clientIP: 250.159.130.70
serverIP: 85.120.32.129
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37395,
"protocol": 6,
"streamName": "meraki",
"clientIP": "79.159.31.247",
"serverIP": "110.198.181.58"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
streamName: meraki
clientIP: 79.159.31.247
serverIP: 110.198.181.58
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37395,
"protocol": 6,
"streamName": "meraki",
"clientIP": "204.163.216.229",
"serverIP": "173.24.36.191"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
streamName: meraki
clientIP: 204.163.216.229
serverIP: 173.24.36.191
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "197.47.245.5",
"serverIP": "100.118.141.210"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 197.47.245.5
serverIP: 100.118.141.210
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "64.252.249.173",
"serverIP": "170.208.224.159"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 64.252.249.173
serverIP: 170.208.224.159
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "215.193.231.196",
"serverIP": "188.74.35.80"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 215.193.231.196
serverIP: 188.74.35.80
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "185.190.161.199",
"serverIP": "185.206.17.145"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 185.190.161.199
serverIP: 185.206.17.145
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52609,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "244.241.34.209",
"serverIP": "182.132.226.12"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52609
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 244.241.34.209
serverIP: 182.132.226.12
|
Explain this syslog message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52609,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "9.183.81.131",
"serverIP": "4.101.140.99"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52609
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 9.183.81.131
serverIP: 4.101.140.99
|
Explain this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "247.136.19.69",
"serverIP": "188.86.108.149"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 247.136.19.69
serverIP: 188.86.108.149
|
Explain this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.178.192.148",
"serverIP": "169.231.63.63"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.178.192.148
serverIP: 169.231.63.63
|
Explain this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.245.202.28",
"serverIP": "71.190.184.183"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.245.202.28
serverIP: 71.190.184.183
|
Explain this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55763,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "229.132.178.31",
"serverIP": "3.143.91.77"
}
|
Create a JSON artifact from the message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55763
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 229.132.178.31
serverIP: 3.143.91.77
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "113.8.165.138",
"serverIP": "46.87.93.154"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 113.8.165.138
serverIP: 46.87.93.154
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "199.236.72.12",
"serverIP": "184.211.203.108"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 199.236.72.12
serverIP: 184.211.203.108
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.104.94.145",
"serverIP": "183.175.211.165"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 76.104.94.145
serverIP: 183.175.211.165
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 17268,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.5.157.140",
"serverIP": "67.132.157.38"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 17268
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.5.157.140
serverIP: 67.132.157.38
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "121.181.235.255",
"serverIP": "219.28.226.131"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 121.181.235.255
serverIP: 219.28.226.131
|
Explain this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18517,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "103.197.237.12",
"serverIP": "64.249.234.188"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18517
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 103.197.237.12
serverIP: 64.249.234.188
|
Explain this syslog message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51817,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "209.86.127.97",
"serverIP": "76.7.224.167"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51817
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 209.86.127.97
serverIP: 76.7.224.167
|
Explain this syslog message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51817,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "205.124.37.180",
"serverIP": "132.67.241.55"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51817
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 205.124.37.180
serverIP: 132.67.241.55
|
Explain this syslog message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46077,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.67.193.100",
"serverIP": "100.226.219.3"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46077
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.67.193.100
serverIP: 100.226.219.3
|
Explain this syslog message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46077,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.95.211.237",
"serverIP": "195.242.166.148"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46077
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.95.211.237
serverIP: 195.242.166.148
|
Explain this syslog message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51599,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "217.5.14.100",
"serverIP": "63.138.250.195"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51599
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 217.5.14.100
serverIP: 63.138.250.195
|
Explain this syslog message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51599,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "1.141.146.202",
"serverIP": "224.17.21.242"
}
|
Create a JSON artifact from the message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51599
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 1.141.146.202
serverIP: 224.17.21.242
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "198.81.84.109",
"serverIP": "71.48.203.44"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 198.81.84.109
serverIP: 71.48.203.44
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "186.232.212.155",
"serverIP": "73.253.203.38"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 186.232.212.155
serverIP: 73.253.203.38
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.198.121.29",
"serverIP": "68.168.254.184"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 36.198.121.29
serverIP: 68.168.254.184
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52968,
"protocol": 6,
"streamName": "meraki",
"clientIP": "176.82.26.86",
"serverIP": "26.134.210.53"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
streamName: meraki
clientIP: 176.82.26.86
serverIP: 26.134.210.53
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.157.100.89",
"serverIP": "236.229.104.110"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
streamName: meraki
clientIP: 15.157.100.89
serverIP: 236.229.104.110
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "236.91.148.70",
"serverIP": "119.241.175.211"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.