input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
2 621470537179 eni-053a8cd1a0cdd861c 218.248.181.7 35.196.17.96 55063 102 6 1 44 1712366708 1712366727 REJECT OK
|
{
"action": "block",
"clientport": 55063,
"endtimeutc": "1712366727",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 218.248.181.7 35.196.17.96 55063 102 6 1 44 1712366708 1712366727 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 102,
"sourceinfo": "unknown",
"starttimeutc": "1712366708",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "218.248.181.7",
"serverIP": "35.196.17.96"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 218.248.181.7 35.196.17.96 55063 102 6 1 44 1712366708 1712366727 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 218.248.181.7 35.196.17.96 55063 102 6 1 44 1712366708 1712366727 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 55063
endtimeutc: 1712366727
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 102
sourceinfo: unknown
starttimeutc: 1712366708
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 218.248.181.7
serverIP: 35.196.17.96
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 200.81.89.100 241.48.182.240 42055 445 6 1 40 1712366648 1712366674 REJECT OK
|
{
"action": "block",
"clientport": 42055,
"endtimeutc": "1712366674",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 200.81.89.100 241.48.182.240 42055 445 6 1 40 1712366648 1712366674 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 445,
"sourceinfo": "unknown",
"starttimeutc": "1712366648",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "200.81.89.100",
"serverIP": "241.48.182.240"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 200.81.89.100 241.48.182.240 42055 445 6 1 40 1712366648 1712366674 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 200.81.89.100 241.48.182.240 42055 445 6 1 40 1712366648 1712366674 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 42055
endtimeutc: 1712366674
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 445
sourceinfo: unknown
starttimeutc: 1712366648
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 200.81.89.100
serverIP: 241.48.182.240
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 133.26.245.223 59.234.215.123 0 0 1 1 36 1712366687 1712366703 REJECT OK
|
{
"action": "block",
"endtimeutc": "1712366703",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 133.26.245.223 59.234.215.123 0 0 1 1 36 1712366687 1712366703 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 1,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"sourceinfo": "unknown",
"starttimeutc": "1712366687",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 36,
"streamName": "aws_vpc_flow_log",
"clientIP": "133.26.245.223",
"serverIP": "59.234.215.123"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 133.26.245.223 59.234.215.123 0 0 1 1 36 1712366687 1712366703 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 133.26.245.223 59.234.215.123 0 0 1 1 36 1712366687 1712366703 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
endtimeutc: 1712366703
messagetype: network_flow_data
protocol: 1
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
sourceinfo: unknown
starttimeutc: 1712366687
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 36
streamName: aws_vpc_flow_log
clientIP: 133.26.245.223
serverIP: 59.234.215.123
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 114.68.103.36 243.157.37.157 15041 5353 17 1 74 1712366648 1712366674 REJECT OK
|
{
"action": "block",
"clientport": 15041,
"endtimeutc": "1712366674",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 114.68.103.36 243.157.37.157 15041 5353 17 1 74 1712366648 1712366674 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 17,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 5353,
"sourceinfo": "unknown",
"starttimeutc": "1712366648",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 74,
"streamName": "aws_vpc_flow_log",
"clientIP": "114.68.103.36",
"serverIP": "243.157.37.157"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 114.68.103.36 243.157.37.157 15041 5353 17 1 74 1712366648 1712366674 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 114.68.103.36 243.157.37.157 15041 5353 17 1 74 1712366648 1712366674 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 15041
endtimeutc: 1712366674
messagetype: network_flow_data
protocol: 17
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 5353
sourceinfo: unknown
starttimeutc: 1712366648
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 74
streamName: aws_vpc_flow_log
clientIP: 114.68.103.36
serverIP: 243.157.37.157
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 26.94.196.163 157.159.180.77 50498 3078 6 1 44 1712366687 1712366703 REJECT OK
|
{
"action": "block",
"clientport": 50498,
"endtimeutc": "1712366703",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 26.94.196.163 157.159.180.77 50498 3078 6 1 44 1712366687 1712366703 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 3078,
"sourceinfo": "unknown",
"starttimeutc": "1712366687",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "26.94.196.163",
"serverIP": "157.159.180.77"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 26.94.196.163 157.159.180.77 50498 3078 6 1 44 1712366687 1712366703 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 26.94.196.163 157.159.180.77 50498 3078 6 1 44 1712366687 1712366703 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 50498
endtimeutc: 1712366703
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 3078
sourceinfo: unknown
starttimeutc: 1712366687
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 26.94.196.163
serverIP: 157.159.180.77
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 179.84.163.125 89.212.210.186 41624 6379 6 1 60 1712366648 1712366674 REJECT OK
|
{
"action": "block",
"clientport": 41624,
"endtimeutc": "1712366674",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 179.84.163.125 89.212.210.186 41624 6379 6 1 60 1712366648 1712366674 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 6379,
"sourceinfo": "unknown",
"starttimeutc": "1712366648",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 60,
"streamName": "aws_vpc_flow_log",
"clientIP": "179.84.163.125",
"serverIP": "89.212.210.186"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 179.84.163.125 89.212.210.186 41624 6379 6 1 60 1712366648 1712366674 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 179.84.163.125 89.212.210.186 41624 6379 6 1 60 1712366648 1712366674 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 41624
endtimeutc: 1712366674
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 6379
sourceinfo: unknown
starttimeutc: 1712366648
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 60
streamName: aws_vpc_flow_log
clientIP: 179.84.163.125
serverIP: 89.212.210.186
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 237.8.185.216 90.222.141.58 55689 8153 6 1 44 1712366687 1712366703 REJECT OK
|
{
"action": "block",
"clientport": 55689,
"endtimeutc": "1712366703",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 237.8.185.216 90.222.141.58 55689 8153 6 1 44 1712366687 1712366703 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 8153,
"sourceinfo": "unknown",
"starttimeutc": "1712366687",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "237.8.185.216",
"serverIP": "90.222.141.58"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 237.8.185.216 90.222.141.58 55689 8153 6 1 44 1712366687 1712366703 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 237.8.185.216 90.222.141.58 55689 8153 6 1 44 1712366687 1712366703 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 55689
endtimeutc: 1712366703
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 8153
sourceinfo: unknown
starttimeutc: 1712366687
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 237.8.185.216
serverIP: 90.222.141.58
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 130.90.143.247 208.199.35.74 51087 9492 6 1 44 1712366687 1712366703 REJECT OK
|
{
"action": "block",
"clientport": 51087,
"endtimeutc": "1712366703",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 130.90.143.247 208.199.35.74 51087 9492 6 1 44 1712366687 1712366703 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 9492,
"sourceinfo": "unknown",
"starttimeutc": "1712366687",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "130.90.143.247",
"serverIP": "208.199.35.74"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 130.90.143.247 208.199.35.74 51087 9492 6 1 44 1712366687 1712366703 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 130.90.143.247 208.199.35.74 51087 9492 6 1 44 1712366687 1712366703 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 51087
endtimeutc: 1712366703
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 9492
sourceinfo: unknown
starttimeutc: 1712366687
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 130.90.143.247
serverIP: 208.199.35.74
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 60.41.156.76 176.179.19.158 52043 24523 6 1 44 1712366648 1712366674 REJECT OK
|
{
"action": "block",
"clientport": 52043,
"endtimeutc": "1712366674",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 60.41.156.76 176.179.19.158 52043 24523 6 1 44 1712366648 1712366674 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 24523,
"sourceinfo": "unknown",
"starttimeutc": "1712366648",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "60.41.156.76",
"serverIP": "176.179.19.158"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 60.41.156.76 176.179.19.158 52043 24523 6 1 44 1712366648 1712366674 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 60.41.156.76 176.179.19.158 52043 24523 6 1 44 1712366648 1712366674 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 52043
endtimeutc: 1712366674
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 24523
sourceinfo: unknown
starttimeutc: 1712366648
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 60.41.156.76
serverIP: 176.179.19.158
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 39.8.139.32 150.140.0.249 50971 25022 6 1 44 1712366564 1712366585 REJECT OK
|
{
"action": "block",
"clientport": 50971,
"endtimeutc": "1712366585",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 39.8.139.32 150.140.0.249 50971 25022 6 1 44 1712366564 1712366585 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 25022,
"sourceinfo": "unknown",
"starttimeutc": "1712366564",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "39.8.139.32",
"serverIP": "150.140.0.249"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 39.8.139.32 150.140.0.249 50971 25022 6 1 44 1712366564 1712366585 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 39.8.139.32 150.140.0.249 50971 25022 6 1 44 1712366564 1712366585 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 50971
endtimeutc: 1712366585
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 25022
sourceinfo: unknown
starttimeutc: 1712366564
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 39.8.139.32
serverIP: 150.140.0.249
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 22.14.87.237 88.49.9.80 52862 28139 6 1 44 1712366648 1712366674 REJECT OK
|
{
"action": "block",
"clientport": 52862,
"endtimeutc": "1712366674",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 22.14.87.237 88.49.9.80 52862 28139 6 1 44 1712366648 1712366674 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 28139,
"sourceinfo": "unknown",
"starttimeutc": "1712366648",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "22.14.87.237",
"serverIP": "88.49.9.80"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 22.14.87.237 88.49.9.80 52862 28139 6 1 44 1712366648 1712366674 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 22.14.87.237 88.49.9.80 52862 28139 6 1 44 1712366648 1712366674 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 52862
endtimeutc: 1712366674
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 28139
sourceinfo: unknown
starttimeutc: 1712366648
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 22.14.87.237
serverIP: 88.49.9.80
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 238.208.72.22 66.84.51.215 58605 12 6 1 44 1712366616 1712366629 REJECT OK
|
{
"action": "block",
"clientport": 58605,
"endtimeutc": "1712366629",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 238.208.72.22 66.84.51.215 58605 12 6 1 44 1712366616 1712366629 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 12,
"sourceinfo": "unknown",
"starttimeutc": "1712366616",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "238.208.72.22",
"serverIP": "66.84.51.215"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 238.208.72.22 66.84.51.215 58605 12 6 1 44 1712366616 1712366629 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 238.208.72.22 66.84.51.215 58605 12 6 1 44 1712366616 1712366629 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 58605
endtimeutc: 1712366629
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 12
sourceinfo: unknown
starttimeutc: 1712366616
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 238.208.72.22
serverIP: 66.84.51.215
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 50.233.66.4 200.226.116.63 2570 22 6 1 44 1712366616 1712366629 REJECT OK
|
{
"action": "block",
"clientport": 2570,
"endtimeutc": "1712366629",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 50.233.66.4 200.226.116.63 2570 22 6 1 44 1712366616 1712366629 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 22,
"sourceinfo": "unknown",
"starttimeutc": "1712366616",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "50.233.66.4",
"serverIP": "200.226.116.63"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 50.233.66.4 200.226.116.63 2570 22 6 1 44 1712366616 1712366629 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 50.233.66.4 200.226.116.63 2570 22 6 1 44 1712366616 1712366629 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 2570
endtimeutc: 1712366629
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 22
sourceinfo: unknown
starttimeutc: 1712366616
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 50.233.66.4
serverIP: 200.226.116.63
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 144.160.55.128 181.188.78.178 49461 2087 6 1 44 1712366564 1712366585 REJECT OK
|
{
"action": "block",
"clientport": 49461,
"endtimeutc": "1712366585",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 144.160.55.128 181.188.78.178 49461 2087 6 1 44 1712366564 1712366585 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 2087,
"sourceinfo": "unknown",
"starttimeutc": "1712366564",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "144.160.55.128",
"serverIP": "181.188.78.178"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 144.160.55.128 181.188.78.178 49461 2087 6 1 44 1712366564 1712366585 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 144.160.55.128 181.188.78.178 49461 2087 6 1 44 1712366564 1712366585 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 49461
endtimeutc: 1712366585
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 2087
sourceinfo: unknown
starttimeutc: 1712366564
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 144.160.55.128
serverIP: 181.188.78.178
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 70.69.185.128 125.4.228.71 0 0 1 1 28 1712366528 1712366548 REJECT OK
|
{
"action": "block",
"endtimeutc": "1712366548",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 70.69.185.128 125.4.228.71 0 0 1 1 28 1712366528 1712366548 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 1,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"sourceinfo": "unknown",
"starttimeutc": "1712366528",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 28,
"streamName": "aws_vpc_flow_log",
"clientIP": "70.69.185.128",
"serverIP": "125.4.228.71"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 70.69.185.128 125.4.228.71 0 0 1 1 28 1712366528 1712366548 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 70.69.185.128 125.4.228.71 0 0 1 1 28 1712366528 1712366548 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
endtimeutc: 1712366548
messagetype: network_flow_data
protocol: 1
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
sourceinfo: unknown
starttimeutc: 1712366528
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 28
streamName: aws_vpc_flow_log
clientIP: 70.69.185.128
serverIP: 125.4.228.71
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 202.224.117.175 222.61.50.187 56858 8149 6 1 44 1712366586 1712366603 REJECT OK
|
{
"action": "block",
"clientport": 56858,
"endtimeutc": "1712366603",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 202.224.117.175 222.61.50.187 56858 8149 6 1 44 1712366586 1712366603 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 8149,
"sourceinfo": "unknown",
"starttimeutc": "1712366586",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "202.224.117.175",
"serverIP": "222.61.50.187"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 202.224.117.175 222.61.50.187 56858 8149 6 1 44 1712366586 1712366603 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 202.224.117.175 222.61.50.187 56858 8149 6 1 44 1712366586 1712366603 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 56858
endtimeutc: 1712366603
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 8149
sourceinfo: unknown
starttimeutc: 1712366586
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 202.224.117.175
serverIP: 222.61.50.187
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 159.248.120.248 62.142.249.247 53957 5985 6 1 44 1712366586 1712366603 REJECT OK
|
{
"action": "block",
"clientport": 53957,
"endtimeutc": "1712366603",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 159.248.120.248 62.142.249.247 53957 5985 6 1 44 1712366586 1712366603 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 5985,
"sourceinfo": "unknown",
"starttimeutc": "1712366586",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "159.248.120.248",
"serverIP": "62.142.249.247"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 159.248.120.248 62.142.249.247 53957 5985 6 1 44 1712366586 1712366603 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 159.248.120.248 62.142.249.247 53957 5985 6 1 44 1712366586 1712366603 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 53957
endtimeutc: 1712366603
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 5985
sourceinfo: unknown
starttimeutc: 1712366586
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 159.248.120.248
serverIP: 62.142.249.247
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 173.194.52.110 48.211.77.41 43989 3063 6 1 40 1712366528 1712366548 REJECT OK
|
{
"action": "block",
"clientport": 43989,
"endtimeutc": "1712366548",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 173.194.52.110 48.211.77.41 43989 3063 6 1 40 1712366528 1712366548 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 3063,
"sourceinfo": "unknown",
"starttimeutc": "1712366528",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 40,
"streamName": "aws_vpc_flow_log",
"clientIP": "173.194.52.110",
"serverIP": "48.211.77.41"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 173.194.52.110 48.211.77.41 43989 3063 6 1 40 1712366528 1712366548 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 173.194.52.110 48.211.77.41 43989 3063 6 1 40 1712366528 1712366548 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 43989
endtimeutc: 1712366548
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 3063
sourceinfo: unknown
starttimeutc: 1712366528
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 40
streamName: aws_vpc_flow_log
clientIP: 173.194.52.110
serverIP: 48.211.77.41
|
Explain this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 38.222.109.145 186.90.150.185 49962 9182 6 1 44 1712366528 1712366548 REJECT OK
|
{
"action": "block",
"clientport": 49962,
"endtimeutc": "1712366548",
"message": "2 621470537179 eni-053a8cd1a0cdd861c 38.222.109.145 186.90.150.185 49962 9182 6 1 44 1712366528 1712366548 REJECT OK",
"messagetype": "network_flow_data",
"protocol": 6,
"senderhost": "eni-053a8cd1a0cdd861c-all",
"sensitivity": "normal",
"serverport": 9182,
"sourceinfo": "unknown",
"starttimeutc": "1712366528",
"tags": [
"621470537179",
"eni-053a8cd1a0cdd861c",
"aws_vpc_flow_log",
"network_flow_data"
],
"totalbytes": 44,
"streamName": "aws_vpc_flow_log",
"clientIP": "38.222.109.145",
"serverIP": "186.90.150.185"
}
|
Create a JSON artifact from the message
|
2 621470537179 eni-053a8cd1a0cdd861c 38.222.109.145 186.90.150.185 49962 9182 6 1 44 1712366528 1712366548 REJECT OK
|
Product: AWS VPC Security
Vendor: Amazon Web Services
|
Identify this syslog message
|
2 621470537179 eni-053a8cd1a0cdd861c 38.222.109.145 186.90.150.185 49962 9182 6 1 44 1712366528 1712366548 REJECT OK
|
This is a syslog message from a product called AWS VPC Security by Amazon Web Services. The following fields were extracted from the message:
action: block
clientport: 49962
endtimeutc: 1712366548
messagetype: network_flow_data
protocol: 6
senderhost: eni-053a8cd1a0cdd861c-all
sensitivity: normal
serverport: 9182
sourceinfo: unknown
starttimeutc: 1712366528
tags: ['621470537179', 'eni-053a8cd1a0cdd861c', 'aws_vpc_flow_log', 'network_flow_data']
totalbytes: 44
streamName: aws_vpc_flow_log
clientIP: 38.222.109.145
serverIP: 186.90.150.185
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:28.128.121.130/55420 dst dmz-1:153.210.97.70/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:28.128.121.130/55420 dst dmz-1:153.210.97.70/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55420,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "28.128.121.130",
"serverIP": "153.210.97.70"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:28.128.121.130/55420 dst dmz-1:153.210.97.70/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:28.128.121.130/55420 dst dmz-1:153.210.97.70/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55420
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 28.128.121.130
serverIP: 153.210.97.70
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:169.130.210.218/55420 dst dmz-1:94.172.220.99/514 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:169.130.210.218/55420 dst dmz-1:94.172.220.99/514 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55420,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "169.130.210.218",
"serverIP": "94.172.220.99"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:169.130.210.218/55420 dst dmz-1:94.172.220.99/514 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:06: %ASA-4-106023: Deny udp src outside:169.130.210.218/55420 dst dmz-1:94.172.220.99/514 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55420
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 169.130.210.218
serverIP: 94.172.220.99
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:40.240.154.188/50182 dst dmz-1:164.49.190.26/6589 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6589,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:40.240.154.188/50182 dst dmz-1:164.49.190.26/6589 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50182,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "40.240.154.188",
"serverIP": "164.49.190.26"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:40.240.154.188/50182 dst dmz-1:164.49.190.26/6589 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:40.240.154.188/50182 dst dmz-1:164.49.190.26/6589 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6589
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50182
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 40.240.154.188
serverIP: 164.49.190.26
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:12.243.87.49/50182 dst dmz-1:37.211.204.51/6589 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6589,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:12.243.87.49/50182 dst dmz-1:37.211.204.51/6589 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50182,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "12.243.87.49",
"serverIP": "37.211.204.51"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:12.243.87.49/50182 dst dmz-1:37.211.204.51/6589 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:05: %ASA-4-106023: Deny tcp src outside:12.243.87.49/50182 dst dmz-1:37.211.204.51/6589 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6589
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50182
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 12.243.87.49
serverIP: 37.211.204.51
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:159.154.161.217/40041 dst dmz-1:42.61.204.105/60443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40041,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:159.154.161.217/40041 dst dmz-1:42.61.204.105/60443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60443,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.61.204.105",
"serverIP": "159.154.161.217"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:159.154.161.217/40041 dst dmz-1:42.61.204.105/60443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:159.154.161.217/40041 dst dmz-1:42.61.204.105/60443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40041
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60443
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 42.61.204.105
serverIP: 159.154.161.217
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:171.68.102.213/40041 dst dmz-1:88.42.97.147/60443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40041,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:171.68.102.213/40041 dst dmz-1:88.42.97.147/60443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60443,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "88.42.97.147",
"serverIP": "171.68.102.213"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:171.68.102.213/40041 dst dmz-1:88.42.97.147/60443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:171.68.102.213/40041 dst dmz-1:88.42.97.147/60443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40041
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60443
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 88.42.97.147
serverIP: 171.68.102.213
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:211.160.68.11/40041 dst dmz-1:129.82.91.49/60443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40041,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:211.160.68.11/40041 dst dmz-1:129.82.91.49/60443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60443,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.82.91.49",
"serverIP": "211.160.68.11"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:211.160.68.11/40041 dst dmz-1:129.82.91.49/60443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:211.160.68.11/40041 dst dmz-1:129.82.91.49/60443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40041
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60443
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.82.91.49
serverIP: 211.160.68.11
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:98.178.121.83/40041 dst dmz-1:72.61.147.199/60443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 40041,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:98.178.121.83/40041 dst dmz-1:72.61.147.199/60443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60443,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "72.61.147.199",
"serverIP": "98.178.121.83"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:98.178.121.83/40041 dst dmz-1:72.61.147.199/60443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:24: %ASA-4-106023: Deny tcp src outside:98.178.121.83/40041 dst dmz-1:72.61.147.199/60443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 40041
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60443
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 72.61.147.199
serverIP: 98.178.121.83
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:206.78.103.225/35726 dst dmz-1:198.148.158.74/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:206.78.103.225/35726 dst dmz-1:198.148.158.74/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "206.78.103.225",
"serverIP": "198.148.158.74"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:206.78.103.225/35726 dst dmz-1:198.148.158.74/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:206.78.103.225/35726 dst dmz-1:198.148.158.74/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 206.78.103.225
serverIP: 198.148.158.74
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:48.136.25.3/35726 dst dmz-1:51.203.218.151/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:48.136.25.3/35726 dst dmz-1:51.203.218.151/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "48.136.25.3",
"serverIP": "51.203.218.151"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:48.136.25.3/35726 dst dmz-1:51.203.218.151/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:48.136.25.3/35726 dst dmz-1:51.203.218.151/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 48.136.25.3
serverIP: 51.203.218.151
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:131.131.107.18/46741 dst dmz-1:108.28.166.17/989 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 989,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:131.131.107.18/46741 dst dmz-1:108.28.166.17/989 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "131.131.107.18",
"serverIP": "108.28.166.17"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:131.131.107.18/46741 dst dmz-1:108.28.166.17/989 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:131.131.107.18/46741 dst dmz-1:108.28.166.17/989 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 989
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 131.131.107.18
serverIP: 108.28.166.17
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:123.177.38.237/46741 dst dmz-1:106.116.0.29/989 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 989,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:123.177.38.237/46741 dst dmz-1:106.116.0.29/989 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.177.38.237",
"serverIP": "106.116.0.29"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:123.177.38.237/46741 dst dmz-1:106.116.0.29/989 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:123.177.38.237/46741 dst dmz-1:106.116.0.29/989 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 989
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.177.38.237
serverIP: 106.116.0.29
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:187.233.80.176/8080 dst dmz-1:171.37.209.214/6770 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6770,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:187.233.80.176/8080 dst dmz-1:171.37.209.214/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "187.233.80.176",
"serverIP": "171.37.209.214"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:187.233.80.176/8080 dst dmz-1:171.37.209.214/6770 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:187.233.80.176/8080 dst dmz-1:171.37.209.214/6770 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6770
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 187.233.80.176
serverIP: 171.37.209.214
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:156.196.7.147/8080 dst dmz-1:67.62.8.207/6770 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6770,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:156.196.7.147/8080 dst dmz-1:67.62.8.207/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "156.196.7.147",
"serverIP": "67.62.8.207"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:156.196.7.147/8080 dst dmz-1:67.62.8.207/6770 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:156.196.7.147/8080 dst dmz-1:67.62.8.207/6770 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6770
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 156.196.7.147
serverIP: 67.62.8.207
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.112.214.159",
"serverIP": "243.63.200.155"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.