input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112... | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.1... | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.... | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181... | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59362
protocol: 6
stream... | Explain this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 50021,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 50021
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unkno... | Explain this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 50021,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 50021
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unkno... | Explain this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"m... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 7680
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknow... | Explain this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| {
"priority": 132,
"senderhost": "10.10.124.188",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"m... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.10.124.188
serverport: 7680
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknow... | Explain this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 1853,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"m... | Create a JSON artifact from the message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 1853
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknow... | Explain this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 1853,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"m... | Create a JSON artifact from the message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 1853
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknow... | Explain this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| {
"priority": 174,
"senderhost": "10.18.255.1",
"serverport": 9997,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 6,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.18.255.1
serverport: 9997
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 6
sourceinfo: un... | Explain this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| {
"priority": 174,
"senderhost": "10.18.255.1",
"serverport": 9997,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 6,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.18.255.1
serverport: 9997
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 6
sourceinfo: un... | Explain this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"serverport": 9997,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"messa... | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
serverport: 9997
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"serverport": 9997,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"messa... | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
serverport: 9997
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| {
"priority": 132,
"senderhost": "10.16.41.67",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"messa... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.16.41.67
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| {
"priority": 132,
"senderhost": "10.16.41.67",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"messa... | Create a JSON artifact from the message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 132
senderhost: 10.16.41.67
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 460,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"me... | Create a JSON artifact from the message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 460
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown... | Explain this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| {
"priority": 133,
"senderhost": "10.129.128.103",
"serverport": 460,
"severitylabel": "notice",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 5,
"sourceinfo": "unknown",
"me... | Create a JSON artifact from the message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 133
senderhost: 10.129.128.103
serverport: 460
severitylabel: notice
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 5
sourceinfo: unknown... | Explain this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.80.23.147",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"mes... | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.80.23.147
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.80.23.147",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17
],
"severitycode": 4,
"sourceinfo": "unknown",
"mes... | Create a JSON artifact from the message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.80.23.147
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6688
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 ds... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6688
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.18... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26974
protocol: 6
stream... | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6992,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6992
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.