input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 125.71.236.55 serverIP: 162.119.205.201
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "169.34.95.246", "serverIP": "236.86.57.99" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 169.34.95.246 serverIP: 236.86.57.99
Explain this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41283, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "231.208.88.160", "serverIP": "108.183.11.166" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41283 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 231.208.88.160 serverIP: 108.183.11.166
Explain this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39567, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "201.31.162.49", "serverIP": "89.243.82.111" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39567 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 201.31.162.49 serverIP: 89.243.82.111
Explain this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39567, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "124.57.165.47", "serverIP": "196.228.47.185" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39567 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 124.57.165.47 serverIP: 196.228.47.185
Explain this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39567, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "246.219.85.14", "serverIP": "242.252.231.207" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39567 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 246.219.85.14 serverIP: 242.252.231.207
Explain this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2087, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39567, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "63.225.104.209", "serverIP": "18.93.13.86" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2087 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39567 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 63.225.104.209 serverIP: 18.93.13.86
Explain this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5990, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52255, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "98.199.24.223", "serverIP": "180.116.211.4" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5990 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52255 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 98.199.24.223 serverIP: 180.116.211.4
Explain this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5990, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52255, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "63.218.211.166", "serverIP": "180.1.86.154" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5990 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52255 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 63.218.211.166 serverIP: 180.1.86.154
Explain this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5990, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52255, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "140.14.240.43", "serverIP": "228.234.53.41" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5990 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52255 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 140.14.240.43 serverIP: 228.234.53.41
Explain this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5990, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52255, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "0.112.82.183", "serverIP": "87.115.131.234" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5990 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52255 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 0.112.82.183 serverIP: 87.115.131.234
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34111, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54053, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "42.92.170.126", "serverIP": "122.94.181.57" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34111 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54053 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 42.92.170.126 serverIP: 122.94.181.57
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34111, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54053, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.124.114.188", "serverIP": "137.99.60.158" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34111 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54053 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.124.114.188 serverIP: 137.99.60.158
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34111, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54053, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "116.205.91.135", "serverIP": "185.18.55.11" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34111 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54053 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 116.205.91.135 serverIP: 185.18.55.11
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 34111, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54053, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "153.213.25.192", "serverIP": "64.80.42.104" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 34111 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54053 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 153.213.25.192 serverIP: 64.80.42.104
Explain this syslog message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6711, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50182, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "124.148.113.2", "serverIP": "200.74.140.248" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6711 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50182 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 124.148.113.2 serverIP: 200.74.140.248
Explain this syslog message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 6711, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 50182, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "214.52.203.61", "serverIP": "21.195.227.192" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 6711 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50182 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 214.52.203.61 serverIP: 21.195.227.192
Explain this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42034, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "26.127.230.164", "serverIP": "45.63.209.131" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42034 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 26.127.230.164 serverIP: 45.63.209.131
Explain this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42034, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "112.38.80.251", "serverIP": "100.103.41.183" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42034 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 112.38.80.251 serverIP: 100.103.41.183
Explain this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42034, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "165.180.45.36", "serverIP": "161.141.75.82" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42034 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 165.180.45.36 serverIP: 161.141.75.82
Explain this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9222, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42034, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "106.48.157.31", "serverIP": "218.165.200.37" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9222 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42034 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 106.48.157.31 serverIP: 218.165.200.37
Explain this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "178.7.0.178", "serverIP": "124.55.30.91" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 178.7.0.178 serverIP: 124.55.30.91
Explain this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "88.128.192.170", "serverIP": "131.56.16.228" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 88.128.192.170 serverIP: 131.56.16.228
Explain this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "9.2.177.193", "serverIP": "203.87.247.117" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 9.2.177.193 serverIP: 203.87.247.117
Explain this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 53294, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "45.104.122.164", "serverIP": "207.134.88.146" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 53294 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 45.104.122.164 serverIP: 207.134.88.146
Explain this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "242.170.174.109", "serverIP": "125.103.198.160" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 242.170.174.109 serverIP: 125.103.198.160
Explain this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "185.163.166.212", "serverIP": "27.29.54.209" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 185.163.166.212 serverIP: 27.29.54.209
Explain this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "73.188.134.97", "serverIP": "88.133.158.141" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 73.188.134.97 serverIP: 88.133.158.141
Explain this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "241.158.198.199", "serverIP": "222.197.249.228" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 241.158.198.199 serverIP: 222.197.249.228
Explain this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "24.86.154.15", "serverIP": "43.125.39.39" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 24.86.154.15 serverIP: 43.125.39.39
Explain this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "149.24.77.150", "serverIP": "240.211.35.167" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 149.24.77.150 serverIP: 240.211.35.167
Explain this syslog message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8298, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48709, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "99.233.148.44", "serverIP": "134.20.139.49" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8298 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48709 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 99.233.148.44 serverIP: 134.20.139.49
Explain this syslog message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8298, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48709, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "4.221.152.211", "serverIP": "81.246.60.84" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8298 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48709 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 4.221.152.211 serverIP: 81.246.60.84
Explain this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40529, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "77.171.1.185", "serverIP": "45.83.15.1" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40529 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 77.171.1.185 serverIP: 45.83.15.1
Explain this syslog message