input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=236.91.148.70 dst=119.241.175.211 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=140.61.60.27 dst=151.106.125.104 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1656489800.491526715 NORDC_MX400_1 flows src=110.217.170.90 dst=117.222.118.96 protocol=tcp sport=52721 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52721 protocol: 6 stream...
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112...
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=218.209.112.28 dst=125.199.149.176 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 stream...
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.1...
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=107.41.92.135 dst=202.152.245.60 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 stream...
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52....
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=192.112.52.212 dst=163.250.180.86 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 stream...
Explain this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181...
Create a JSON artifact from the message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.119.176.26 1 1656316704.731221245 M52_MX67C_Loxley flows src=200.155.181.18 dst=219.161.132.46 protocol=tcp sport=59362 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59362 protocol: 6 stream...
Explain this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 50021, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "...
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:70.177.27.17/50021 dst outside:171.8.242.24/50024 by access-group "inside" [0x9701e64b, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 50021 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 50021, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "...
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:56 10.10.124.188 : %ASA-4-106023: Deny udp src inside:106.75.210.212/50021 dst outside:92.50.201.204/50024 by access-group "inside" [0x9701e64b, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 50021 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unkno...
Explain this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "m...
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:164.52.23.217/62391 dst outside:75.218.141.239/7680 by access-group "inside" [0xb9ad77a1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 7680 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
{ "priority": 132, "senderhost": "10.10.124.188", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "m...
Create a JSON artifact from the message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:13:23 10.10.124.188 : %ASA-4-106023: Deny tcp src inside:162.124.242.221/62391 dst outside:237.54.9.164/7680 by access-group "inside" [0xb9ad77a1, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.10.124.188 serverport: 7680 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 1853, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "m...
Create a JSON artifact from the message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/62.43.223.228(43637) -> outside/164.69.85.20(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 1853 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknow...
Explain this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 1853, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "m...
Create a JSON artifact from the message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:13:24 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/5.59.80.74(43637) -> outside/25.3.42.116(1853) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 1853 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknow...
Explain this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
{ "priority": 174, "senderhost": "10.18.255.1", "serverport": 9997, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 6, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/123.73.110.229(57898) -> outside/9.203.37.80(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.18.255.1 serverport: 9997 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 6 sourceinfo: un...
Explain this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
{ "priority": 174, "senderhost": "10.18.255.1", "serverport": 9997, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 6, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Mar 13 2023 18:14:07 10.18.255.1 : %ASA-6-106100: access-list inside denied tcp inside/236.78.82.183(57898) -> outside/120.62.31.17(9997) hit-cnt 1 300-second interval [0xd820e56a, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.18.255.1 serverport: 9997 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 6 sourceinfo: un...
Explain this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "serverport": 9997, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "messa...
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:26.176.59.111/58283 dst OUTSIDE:122.200.130.94/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 serverport: 9997 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.83.7.3", "serverport": 9997, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "messa...
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:02 tismtlinternetfw1 : %ASA-4-106023: Deny tcp src INSIDE:95.186.46.134/58283 dst OUTSIDE:189.201.40.113/9997 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.83.7.3 serverport: 9997 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
{ "priority": 132, "senderhost": "10.16.41.67", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "messa...
Create a JSON artifact from the message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:127.3.227.110/48978 dst outside:194.43.238.23/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.16.41.67 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
{ "priority": 132, "senderhost": "10.16.41.67", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "messa...
Create a JSON artifact from the message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<132>Mar 13 2023 18:14:39 10.16.41.67 : %ASA-4-106023: Deny udp src ENGINEERING_DMZ:145.10.193.244/48978 dst outside:137.188.154.36/53 by access-group "GLOBAL-IN" [0xa4fd81ea, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 132 senderhost: 10.16.41.67 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 460, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "me...
Create a JSON artifact from the message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/142.157.33.100(58064) -> outside/133.38.79.168(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 460 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown...
Explain this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
{ "priority": 133, "senderhost": "10.129.128.103", "serverport": 460, "severitylabel": "notice", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 5, "sourceinfo": "unknown", "me...
Create a JSON artifact from the message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<133>Mar 13 2023 18:14:39 J0061fw01-P/Internet : %ASA-5-106100: access-list global denied tcp outside/158.104.211.126(58064) -> outside/226.243.129.166(460) hit-cnt 1 first hit [0x373e5141, 0x00000000]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 133 senderhost: 10.129.128.103 serverport: 460 severitylabel: notice tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 5 sourceinfo: unknown...
Explain this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.80.23.147", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "mes...
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:56.49.17.196/50889 dst OUTSIDE:13.189.253.28/443 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.80.23.147 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
{ "priority": 188, "senderhost": "10.80.23.147", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17 ], "severitycode": 4, "sourceinfo": "unknown", "mes...
Create a JSON artifact from the message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<188>Mar 13 2023 18:14:35 TOR-IOC-ASA : %ASA-4-106023: Deny tcp src INSIDE:5.148.105.246/50889 dst OUTSIDE:159.40.77.231/443 by access-group "INSIDE_ACL" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 188 senderhost: 10.80.23.147 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=192.106.161.56 dst=87.31.250.110 protocol=tcp sport=6688 dport=25 pattern: 1 dst 87.31.250.110
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6688 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 ds...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.313451814 NORDC_MX400_1 flows src=131.92.7.17 dst=125.100.187.57 protocol=tcp sport=6688 dport=25 pattern: 1 dst 125.100.187.57
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6688 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=240.102.12.33 dst=25.20.221.255 protocol=tcp sport=26974 dport=25 pattern: 1 dst 25.20.221.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.38.125.107 dst=30.15.199.115 protocol=tcp sport=26974 dport=25 pattern: 1 dst 30.15.199.115
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=84.151.44.189 dst=233.178.157.35 protocol=tcp sport=26974 dport=25 pattern: 1 dst 233.178.157.35
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.18...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663685767.715168658 NORDC_MX400_1 flows src=107.148.151.188 dst=151.246.78.139 protocol=tcp sport=26974 dport=25 pattern: 1 dst 151.246.78.139
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26974 protocol: 6 stream...
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:148.146.163.131/6992 dst dmz-1:34.113.211.14/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:7.5.45.145/6992 dst dmz-1:17.212.147.7/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:230.98.219.244/6992 dst dmz-1:146.11.48.9/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6992, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 30 2022 19:59:59: %ASA-4-106023: Deny tcp src outside:91.160.255.72/6992 dst dmz-1:214.119.167.230/40063 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6992 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message