input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:50.112.214.159/35726 dst dmz-1:243.63.200.155/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 50.112.214.159 serverIP: 243.63.200.155
Explain this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35726, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "107.98.168.109", "serverIP": "121.231.168.184" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:107.98.168.109/35726 dst dmz-1:121.231.168.184/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 107.98.168.109 serverIP: 121.231.168.184
Explain this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 56499, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61130, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "180.6.201.232", "serverIP": "79.139.245.160" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:79.139.245.160/56499 dst dmz-1:180.6.201.232/61130 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 56499 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61130 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 180.6.201.232 serverIP: 79.139.245.160
Explain this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 56499, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61130, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "85.86.95.78", "serverIP": "245.239.38.220" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:245.239.38.220/56499 dst dmz-1:85.86.95.78/61130 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 56499 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61130 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 85.86.95.78 serverIP: 245.239.38.220
Explain this syslog message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 989, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "87.57.141.194", "serverIP": "200.156.80.129" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:87.57.141.194/46741 dst dmz-1:200.156.80.129/989 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 989 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 87.57.141.194 serverIP: 200.156.80.129
Explain this syslog message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 989, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46741, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "10.151.230.43", "serverIP": "61.17.185.130" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:07: %ASA-4-106023: Deny tcp src outside:10.151.230.43/46741 dst dmz-1:61.17.185.130/989 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 989 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46741 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 10.151.230.43 serverIP: 61.17.185.130
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6770, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8080, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.89.199.221", "serverIP": "9.146.246.86" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:174.89.199.221/8080 dst dmz-1:9.146.246.86/6770 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6770 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8080 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 174.89.199.221 serverIP: 9.146.246.86
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6770, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 8080, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "93.121.211.214", "serverIP": "171.90.50.118" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:93.121.211.214/8080 dst dmz-1:171.90.50.118/6770 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6770 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 8080 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 93.121.211.214 serverIP: 171.90.50.118
Explain this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35726, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "214.238.61.183", "serverIP": "67.255.49.121" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:214.238.61.183/35726 dst dmz-1:67.255.49.121/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 214.238.61.183 serverIP: 67.255.49.121
Explain this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35726, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "246.62.111.150", "serverIP": "148.44.26.219" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:246.62.111.150/35726 dst dmz-1:148.44.26.219/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 246.62.111.150 serverIP: 148.44.26.219
Explain this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 56499, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61130, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "117.75.80.190", "serverIP": "89.168.181.254" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:89.168.181.254/56499 dst dmz-1:117.75.80.190/61130 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 56499 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61130 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 117.75.80.190 serverIP: 89.168.181.254
Explain this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 56499, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61130, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "100.146.85.102", "serverIP": "191.36.128.97" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:28: %ASA-4-106023: Deny tcp src outside:191.36.128.97/56499 dst dmz-1:100.146.85.102/61130 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 56499 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61130 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 100.146.85.102 serverIP: 191.36.128.97
Explain this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35726, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "228.72.238.205", "serverIP": "137.101.181.172" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:228.72.238.205/35726 dst dmz-1:137.101.181.172/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 228.72.238.205 serverIP: 137.101.181.172
Explain this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8000, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 35726, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "184.82.41.119", "serverIP": "42.169.223.86" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:27: %ASA-4-106023: Deny tcp src outside:184.82.41.119/35726 dst dmz-1:42.169.223.86/8000 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8000 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 35726 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 184.82.41.119 serverIP: 42.169.223.86
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47166, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "245.198.129.101", "serverIP": "26.31.143.22" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:245.198.129.101/47166 dst dmz-1:26.31.143.22/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47166 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 245.198.129.101 serverIP: 26.31.143.22
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47166, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "97.239.166.180", "serverIP": "79.196.83.109" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:97.239.166.180/47166 dst dmz-1:79.196.83.109/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47166 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 97.239.166.180 serverIP: 79.196.83.109
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47166, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "254.114.71.39", "serverIP": "40.28.36.200" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:254.114.71.39/47166 dst dmz-1:40.28.36.200/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47166 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 254.114.71.39 serverIP: 40.28.36.200
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47166, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "155.141.53.207", "serverIP": "113.145.151.208" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:155.141.53.207/47166 dst dmz-1:113.145.151.208/9001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47166 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 155.141.53.207 serverIP: 113.145.151.208
Explain this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "172.16.100.101", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54128, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "2.52.240.220", "serverIP": "126.204.41.228" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:2.52.240.220/54128 dst Outside:126.204.41.228/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 172.16.100.101 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54128 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 2.52.240.220 serverIP: 126.204.41.228
Explain this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "172.16.100.101", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54128, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "191.156.253.69", "serverIP": "222.32.215.104" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:191.156.253.69/54128 dst Outside:222.32.215.104/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 172.16.100.101 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54128 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 191.156.253.69 serverIP: 222.32.215.104
Explain this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "172.16.100.101", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54128, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "78.246.222.143", "serverIP": "30.39.223.175" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:78.246.222.143/54128 dst Outside:30.39.223.175/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 172.16.100.101 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54128 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 78.246.222.143 serverIP: 30.39.223.175
Explain this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "172.16.100.101", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group \"Inside_Vlan1_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54128, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "156.229.74.26", "serverIP": "176.23.164.58" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:21:21: %ASA-4-106023: Deny tcp src Inside_Vlan1:156.229.74.26/54128 dst Outside:176.23.164.58/80 by access-group "Inside_Vlan1_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 172.16.100.101 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54128 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 156.229.74.26 serverIP: 176.23.164.58
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 28916, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38535, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "237.243.103.133", "serverIP": "93.142.250.68" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:237.243.103.133/38535 dst dmz-1:93.142.250.68/28916 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 28916 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38535 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 237.243.103.133 serverIP: 93.142.250.68
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 28916, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38535, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "188.236.102.72", "serverIP": "234.56.66.228" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:188.236.102.72/38535 dst dmz-1:234.56.66.228/28916 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 28916 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38535 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 188.236.102.72 serverIP: 234.56.66.228
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 28916, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38535, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "105.229.89.65", "serverIP": "249.181.217.240" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:105.229.89.65/38535 dst dmz-1:249.181.217.240/28916 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 28916 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38535 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 105.229.89.65 serverIP: 249.181.217.240
Explain this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 28916, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 38535, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "200.76.174.117", "serverIP": "211.78.198.130" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:16: %ASA-4-106023: Deny tcp src outside:200.76.174.117/38535 dst dmz-1:211.78.198.130/28916 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 28916 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 38535 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 200.76.174.117 serverIP: 211.78.198.130
Explain this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 15561, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "159.33.229.93", "serverIP": "145.208.43.129" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:159.33.229.93/51259 dst dmz-1:145.208.43.129/15561 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 15561 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 159.33.229.93 serverIP: 145.208.43.129
Explain this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 15561, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "15.143.36.169", "serverIP": "47.250.99.72" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:15.143.36.169/51259 dst dmz-1:47.250.99.72/15561 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 15561 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 15.143.36.169 serverIP: 47.250.99.72
Explain this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 15561, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.38.210.11", "serverIP": "41.165.223.97" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:167.38.210.11/51259 dst dmz-1:41.165.223.97/15561 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 15561 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 167.38.210.11 serverIP: 41.165.223.97
Explain this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 15561, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51259, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "137.18.16.45", "serverIP": "162.73.151.183" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:48: %ASA-4-106023: Deny tcp src outside:137.18.16.45/51259 dst dmz-1:162.73.151.183/15561 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 15561 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51259 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 137.18.16.45 serverIP: 162.73.151.183
Explain this syslog message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 47047, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53261, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "175.93.188.110", "serverIP": "137.93.202.102" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:137.93.202.102/47047 dst dmz-1:175.93.188.110/53261 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 47047 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53261 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 175.93.188.110 serverIP: 137.93.202.102
Explain this syslog message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 47047, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53261, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "157.253.77.115", "serverIP": "167.26.134.216" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:54: %ASA-4-106023: Deny tcp src outside:167.26.134.216/47047 dst dmz-1:157.253.77.115/53261 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 47047 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53261 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 157.253.77.115 serverIP: 167.26.134.216
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "211.221.251.253", "serverIP": "235.229.17.238" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:211.221.251.253/41283 dst dmz-1:235.229.17.238/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 211.221.251.253 serverIP: 235.229.17.238
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "125.71.236.55", "serverIP": "162.119.205.201" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message