input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.18... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=251.136.131.184 dst=29.219.42.80 protocol=tcp sport=35084 dport=25 pattern: 1 dst 29.219.42.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.346982259 NORDC_MX400_1 flows src=121.74.103.217 dst=1.153.105.51 protocol=tcp sport=35084 dport=25 pattern: 1 dst 1.153.105.51 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35084
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=155.13.226.80 dst=221.222.120.71 protocol=tcp sport=49312 dport=25 pattern: 1 dst 221.222.120.71 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.349731307 NORDC_MX400_1 flows src=250.159.130.70 dst=85.120.32.129 protocol=tcp sport=49312 dport=25 pattern: 1 dst 85.120.32.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49312
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=79.159.31.247 dst=110.198.181.58 protocol=tcp sport=37395 dport=25 pattern: 1 dst 110.198.181.58 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.22... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.393028642 NORDC_MX400_1 flows src=204.163.216.229 dst=173.24.36.191 protocol=tcp sport=37395 dport=25 pattern: 1 dst 173.24.36.191 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37395
protocol: 6
stream... | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:197.47.245.5/55763 dst dmz-1:100.118.141.210/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:64.252.249.173/55763 dst dmz-1:170.208.224.159/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:215.193.231.196/55763 dst dmz-1:188.74.35.80/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:11: %ASA-4-106023: Deny tcp src outside:185.190.161.199/55763 dst dmz-1:185.206.17.145/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:182.132.226.12/40784 dst dmz-1:244.241.34.209/52609 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40784,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:23:27: %ASA-4-106023: Deny tcp src outside:4.101.140.99/40784 dst dmz-1:9.183.81.131/52609 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40784
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:247.136.19.69/55763 dst dmz-1:188.86.108.149/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:106.178.192.148/55763 dst dmz-1:169.231.63.63/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:11.245.202.28/55763 dst dmz-1:71.190.184.183/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3306,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Oct 21 2022 20:25:57: %ASA-4-106023: Deny tcp src outside:229.132.178.31/55763 dst dmz-1:3.143.91.77/3306 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3306
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:113.8.165.138/18517 dst dmz-1:46.87.93.154/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:199.236.72.12/18517 dst dmz-1:184.211.203.108/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:76.104.94.145/17268 dst dmz-1:183.175.211.165/175 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 175,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:09: %ASA-4-106023: Deny tcp src outside:125.5.157.140/17268 dst dmz-1:67.132.157.38/175 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 175
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:121.181.235.255/18517 dst dmz-1:219.28.226.131/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:44:54: %ASA-4-106023: Deny tcp src outside:103.197.237.12/18517 dst dmz-1:64.249.234.188/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:209.86.127.97/51817 dst dmz-1:76.7.224.167/10073 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10073,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:32: %ASA-4-106023: Deny tcp src outside:205.124.37.180/51817 dst dmz-1:132.67.241.55/10073 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10073
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:65.67.193.100/46077 dst dmz-1:100.226.219.3/5985 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5985,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:45:53: %ASA-4-106023: Deny tcp src outside:11.95.211.237/46077 dst dmz-1:195.242.166.148/5985 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5985
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:217.5.14.100/51599 dst dmz-1:63.138.250.195/25 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 13 2022 05:46:21: %ASA-4-106023: Deny tcp src outside:1.141.146.202/51599 dst dmz-1:224.17.21.242/25 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=198.81.84.109 dst=71.48.203.44 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
str... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=186.232.212.155 dst=73.253.203.38 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
str... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=36.198.121.29 dst=68.168.254.184 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
str... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 32127,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1656448430.776097520 M34_MX67C_Atlanta flows src=176.82.26.86 dst=26.134.210.53 protocol=tcp sport=52968 dport=32127 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 32127
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52968
protocol: 6
str... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=15.157.100.89 dst=236.229.104.110 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 ... | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.