input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:125.71.236.55/41283 dst dmz-1:162.119.205.201/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.71.236.55
serverIP: 162.119.205.201
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "169.34.95.246",
"serverIP": "236.86.57.99"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:169.34.95.246/41283 dst dmz-1:236.86.57.99/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 169.34.95.246
serverIP: 236.86.57.99
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41283,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "231.208.88.160",
"serverIP": "108.183.11.166"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:32: %ASA-4-106023: Deny tcp src outside:231.208.88.160/41283 dst dmz-1:108.183.11.166/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41283
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 231.208.88.160
serverIP: 108.183.11.166
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39567,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "201.31.162.49",
"serverIP": "89.243.82.111"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:201.31.162.49/39567 dst dmz-1:89.243.82.111/2087 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39567
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 201.31.162.49
serverIP: 89.243.82.111
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39567,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "124.57.165.47",
"serverIP": "196.228.47.185"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:124.57.165.47/39567 dst dmz-1:196.228.47.185/2087 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39567
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 124.57.165.47
serverIP: 196.228.47.185
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39567,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "246.219.85.14",
"serverIP": "242.252.231.207"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:246.219.85.14/39567 dst dmz-1:242.252.231.207/2087 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39567
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 246.219.85.14
serverIP: 242.252.231.207
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2087,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39567,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "63.225.104.209",
"serverIP": "18.93.13.86"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:36: %ASA-4-106023: Deny tcp src outside:63.225.104.209/39567 dst dmz-1:18.93.13.86/2087 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2087
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39567
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 63.225.104.209
serverIP: 18.93.13.86
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5990,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52255,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "98.199.24.223",
"serverIP": "180.116.211.4"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:98.199.24.223/52255 dst dmz-1:180.116.211.4/5990 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5990
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52255
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 98.199.24.223
serverIP: 180.116.211.4
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5990,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52255,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "63.218.211.166",
"serverIP": "180.1.86.154"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:63.218.211.166/52255 dst dmz-1:180.1.86.154/5990 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5990
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52255
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 63.218.211.166
serverIP: 180.1.86.154
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5990,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52255,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "140.14.240.43",
"serverIP": "228.234.53.41"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:140.14.240.43/52255 dst dmz-1:228.234.53.41/5990 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5990
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52255
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 140.14.240.43
serverIP: 228.234.53.41
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5990,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52255,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "0.112.82.183",
"serverIP": "87.115.131.234"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:14: %ASA-4-106023: Deny tcp src outside:0.112.82.183/52255 dst dmz-1:87.115.131.234/5990 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5990
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52255
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 0.112.82.183
serverIP: 87.115.131.234
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34111,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54053,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.92.170.126",
"serverIP": "122.94.181.57"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:42.92.170.126/54053 dst dmz-1:122.94.181.57/34111 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34111
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54053
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 42.92.170.126
serverIP: 122.94.181.57
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34111,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54053,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.124.114.188",
"serverIP": "137.99.60.158"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:240.124.114.188/54053 dst dmz-1:137.99.60.158/34111 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34111
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54053
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.124.114.188
serverIP: 137.99.60.158
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34111,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54053,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "116.205.91.135",
"serverIP": "185.18.55.11"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:116.205.91.135/54053 dst dmz-1:185.18.55.11/34111 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34111
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54053
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 116.205.91.135
serverIP: 185.18.55.11
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 34111,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54053,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "153.213.25.192",
"serverIP": "64.80.42.104"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:153.213.25.192/54053 dst dmz-1:64.80.42.104/34111 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 34111
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54053
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 153.213.25.192
serverIP: 64.80.42.104
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6711,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50182,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "124.148.113.2",
"serverIP": "200.74.140.248"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:124.148.113.2/50182 dst dmz-1:200.74.140.248/6711 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6711
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50182
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 124.148.113.2
serverIP: 200.74.140.248
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 6711,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50182,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "214.52.203.61",
"serverIP": "21.195.227.192"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:13: %ASA-4-106023: Deny tcp src outside:214.52.203.61/50182 dst dmz-1:21.195.227.192/6711 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 6711
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50182
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 214.52.203.61
serverIP: 21.195.227.192
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42034,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "26.127.230.164",
"serverIP": "45.63.209.131"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:26.127.230.164/42034 dst dmz-1:45.63.209.131/9222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42034
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 26.127.230.164
serverIP: 45.63.209.131
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42034,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "112.38.80.251",
"serverIP": "100.103.41.183"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:112.38.80.251/42034 dst dmz-1:100.103.41.183/9222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42034
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 112.38.80.251
serverIP: 100.103.41.183
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42034,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "165.180.45.36",
"serverIP": "161.141.75.82"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:165.180.45.36/42034 dst dmz-1:161.141.75.82/9222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42034
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 165.180.45.36
serverIP: 161.141.75.82
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9222,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42034,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "106.48.157.31",
"serverIP": "218.165.200.37"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:25: %ASA-4-106023: Deny tcp src outside:106.48.157.31/42034 dst dmz-1:218.165.200.37/9222 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9222
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42034
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 106.48.157.31
serverIP: 218.165.200.37
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "178.7.0.178",
"serverIP": "124.55.30.91"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:178.7.0.178/53294 dst dmz-1:124.55.30.91/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 178.7.0.178
serverIP: 124.55.30.91
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "88.128.192.170",
"serverIP": "131.56.16.228"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:88.128.192.170/53294 dst dmz-1:131.56.16.228/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 88.128.192.170
serverIP: 131.56.16.228
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "9.2.177.193",
"serverIP": "203.87.247.117"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:9.2.177.193/53294 dst dmz-1:203.87.247.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 9.2.177.193
serverIP: 203.87.247.117
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 53294,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "45.104.122.164",
"serverIP": "207.134.88.146"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:24: %ASA-4-106023: Deny tcp src outside:45.104.122.164/53294 dst dmz-1:207.134.88.146/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 53294
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 45.104.122.164
serverIP: 207.134.88.146
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "242.170.174.109",
"serverIP": "125.103.198.160"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:242.170.174.109/41733 dst dmz-1:125.103.198.160/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 242.170.174.109
serverIP: 125.103.198.160
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "185.163.166.212",
"serverIP": "27.29.54.209"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:185.163.166.212/41733 dst dmz-1:27.29.54.209/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 185.163.166.212
serverIP: 27.29.54.209
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "73.188.134.97",
"serverIP": "88.133.158.141"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:73.188.134.97/41733 dst dmz-1:88.133.158.141/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 73.188.134.97
serverIP: 88.133.158.141
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "241.158.198.199",
"serverIP": "222.197.249.228"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:241.158.198.199/41733 dst dmz-1:222.197.249.228/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 241.158.198.199
serverIP: 222.197.249.228
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.86.154.15",
"serverIP": "43.125.39.39"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:24.86.154.15/41733 dst dmz-1:43.125.39.39/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 24.86.154.15
serverIP: 43.125.39.39
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "149.24.77.150",
"serverIP": "240.211.35.167"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:35: %ASA-4-106023: Deny tcp src outside:149.24.77.150/41733 dst dmz-1:240.211.35.167/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 149.24.77.150
serverIP: 240.211.35.167
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8298,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48709,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "99.233.148.44",
"serverIP": "134.20.139.49"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:99.233.148.44/48709 dst dmz-1:134.20.139.49/8298 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8298
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48709
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 99.233.148.44
serverIP: 134.20.139.49
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8298,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48709,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "4.221.152.211",
"serverIP": "81.246.60.84"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:41: %ASA-4-106023: Deny udp src outside:4.221.152.211/48709 dst dmz-1:81.246.60.84/8298 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8298
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48709
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 4.221.152.211
serverIP: 81.246.60.84
|
Explain this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40529,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "77.171.1.185",
"serverIP": "45.83.15.1"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:77.171.1.185/40529 dst dmz-1:45.83.15.1/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40529
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 77.171.1.185
serverIP: 45.83.15.1
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.