input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.112.214.159
serverIP: 243.63.200.155
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "107.98.168.109",
"serverIP": "121.231.168.184"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 107.98.168.109
serverIP: 121.231.168.184
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 56499,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61130,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "180.6.201.232",
"serverIP": "79.139.245.160"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 56499
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61130
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 180.6.201.232
serverIP: 79.139.245.160
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 56499,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61130,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "85.86.95.78",
"serverIP": "245.239.38.220"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 56499
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61130
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 85.86.95.78
serverIP: 245.239.38.220
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 989,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "87.57.141.194",
"serverIP": "200.156.80.129"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 989
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 87.57.141.194
serverIP: 200.156.80.129
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 989,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "10.151.230.43",
"serverIP": "61.17.185.130"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 989
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 10.151.230.43
serverIP: 61.17.185.130
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6770,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.89.199.221",
"serverIP": "9.146.246.86"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6770
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.89.199.221
serverIP: 9.146.246.86
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6770,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 8080,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "93.121.211.214",
"serverIP": "171.90.50.118"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6770
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 8080
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 93.121.211.214
serverIP: 171.90.50.118
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "214.238.61.183",
"serverIP": "67.255.49.121"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 214.238.61.183
serverIP: 67.255.49.121
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "246.62.111.150",
"serverIP": "148.44.26.219"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 246.62.111.150
serverIP: 148.44.26.219
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 56499,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61130,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "117.75.80.190",
"serverIP": "89.168.181.254"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 56499
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61130
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 117.75.80.190
serverIP: 89.168.181.254
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 56499,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61130,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "100.146.85.102",
"serverIP": "191.36.128.97"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 56499
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61130
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 100.146.85.102
serverIP: 191.36.128.97
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.72.238.205",
"serverIP": "137.101.181.172"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.72.238.205
serverIP: 137.101.181.172
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8000,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 35726,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "184.82.41.119",
"serverIP": "42.169.223.86"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8000
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 35726
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 184.82.41.119
serverIP: 42.169.223.86
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47166,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "245.198.129.101",
"serverIP": "26.31.143.22"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47166
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 245.198.129.101
serverIP: 26.31.143.22
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47166,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "97.239.166.180",
"serverIP": "79.196.83.109"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47166
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 97.239.166.180
serverIP: 79.196.83.109
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47166,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "254.114.71.39",
"serverIP": "40.28.36.200"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47166
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 254.114.71.39
serverIP: 40.28.36.200
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47166,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "155.141.53.207",
"serverIP": "113.145.151.208"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47166
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 155.141.53.207
serverIP: 113.145.151.208
|
Explain this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "172.16.100.101",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54128,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.52.240.220",
"serverIP": "126.204.41.228"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 172.16.100.101
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54128
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.52.240.220
serverIP: 126.204.41.228
|
Explain this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "172.16.100.101",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54128,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "191.156.253.69",
"serverIP": "222.32.215.104"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 172.16.100.101
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54128
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 191.156.253.69
serverIP: 222.32.215.104
|
Explain this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "172.16.100.101",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54128,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "78.246.222.143",
"serverIP": "30.39.223.175"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 172.16.100.101
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54128
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 78.246.222.143
serverIP: 30.39.223.175
|
Explain this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "172.16.100.101",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54128,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "156.229.74.26",
"serverIP": "176.23.164.58"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 172.16.100.101
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54128
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 156.229.74.26
serverIP: 176.23.164.58
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 28916,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38535,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "237.243.103.133",
"serverIP": "93.142.250.68"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 28916
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38535
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 237.243.103.133
serverIP: 93.142.250.68
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 28916,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38535,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "188.236.102.72",
"serverIP": "234.56.66.228"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 28916
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38535
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 188.236.102.72
serverIP: 234.56.66.228
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 28916,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38535,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "105.229.89.65",
"serverIP": "249.181.217.240"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 28916
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38535
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 105.229.89.65
serverIP: 249.181.217.240
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 28916,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 38535,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.76.174.117",
"serverIP": "211.78.198.130"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 28916
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 38535
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.76.174.117
serverIP: 211.78.198.130
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 15561,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "159.33.229.93",
"serverIP": "145.208.43.129"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 15561
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 159.33.229.93
serverIP: 145.208.43.129
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 15561,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "15.143.36.169",
"serverIP": "47.250.99.72"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 15561
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 15.143.36.169
serverIP: 47.250.99.72
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 15561,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.38.210.11",
"serverIP": "41.165.223.97"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 15561
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 167.38.210.11
serverIP: 41.165.223.97
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 15561,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51259,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "137.18.16.45",
"serverIP": "162.73.151.183"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 15561
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51259
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 137.18.16.45
serverIP: 162.73.151.183
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47047,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53261,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "175.93.188.110",
"serverIP": "137.93.202.102"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47047
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53261
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 175.93.188.110
serverIP: 137.93.202.102
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47047,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53261,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "157.253.77.115",
"serverIP": "167.26.134.216"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47047
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53261
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 157.253.77.115
serverIP: 167.26.134.216
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "211.221.251.253",
"serverIP": "235.229.17.238"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 211.221.251.253
serverIP: 235.229.17.238
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.71.236.55",
"serverIP": "162.119.205.201"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.