input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40529, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "247.130.179.204", "serverIP": "36.108.184.28" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40529 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 247.130.179.204 serverIP: 36.108.184.28
Explain this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52869, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54380, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "24.230.99.144", "serverIP": "194.25.188.147" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52869 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54380 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 24.230.99.144 serverIP: 194.25.188.147
Explain this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52869, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54380, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "176.145.124.197", "serverIP": "195.71.118.151" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52869 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54380 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 176.145.124.197 serverIP: 195.71.118.151
Explain this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52869, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54380, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "114.121.234.58", "serverIP": "43.37.236.28" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52869 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54380 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 114.121.234.58 serverIP: 43.37.236.28
Explain this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52869, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54380, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "16.175.175.250", "serverIP": "123.183.202.166" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52869 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54380 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 16.175.175.250 serverIP: 123.183.202.166
Explain this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "129.120.187.232", "serverIP": "203.215.74.74" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 129.120.187.232 serverIP: 203.215.74.74
Explain this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "227.75.206.126", "serverIP": "203.37.84.165" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 227.75.206.126 serverIP: 203.37.84.165
Explain this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "171.170.2.226", "serverIP": "153.228.97.184" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 171.170.2.226 serverIP: 153.228.97.184
Explain this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48949, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "64.230.158.90", "serverIP": "231.168.128.53" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48949 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 64.230.158.90 serverIP: 231.168.128.53
Explain this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2375, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41780, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "42.244.39.133", "serverIP": "57.18.102.220" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2375 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41780 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 42.244.39.133 serverIP: 57.18.102.220
Explain this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2375, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41780, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "160.114.238.95", "serverIP": "60.18.173.112" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2375 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41780 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 160.114.238.95 serverIP: 60.18.173.112
Explain this syslog message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 46723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47047, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "22.32.151.181", "serverIP": "235.149.226.34" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 46723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47047 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 22.32.151.181 serverIP: 235.149.226.34
Explain this syslog message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 46723, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47047, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "172.60.166.108", "serverIP": "109.123.37.72" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 46723 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47047 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 172.60.166.108 serverIP: 109.123.37.72
Explain this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2375, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41780, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "80.2.85.81", "serverIP": "21.10.152.23" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2375 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41780 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 80.2.85.81 serverIP: 21.10.152.23
Explain this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2375, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41780, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "89.125.25.168", "serverIP": "237.175.49.177" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2375 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41780 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 89.125.25.168 serverIP: 237.175.49.177
Explain this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12100, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55752, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "120.205.73.181", "serverIP": "82.171.195.253" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12100 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55752 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 120.205.73.181 serverIP: 82.171.195.253
Explain this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12100, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55752, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "138.69.188.32", "serverIP": "88.48.157.168" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12100 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55752 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 138.69.188.32 serverIP: 88.48.157.168
Explain this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12100, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55752, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "95.223.5.215", "serverIP": "5.217.215.170" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12100 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55752 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 95.223.5.215 serverIP: 5.217.215.170
Explain this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12100, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55752, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "59.152.11.7", "serverIP": "10.38.38.16" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12100 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55752 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 59.152.11.7 serverIP: 10.38.38.16
Explain this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5632, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "8.205.148.151", "serverIP": "119.203.218.202" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5632 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29637 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 8.205.148.151 serverIP: 119.203.218.202
Explain this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5632, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "103.135.136.148", "serverIP": "30.138.20.56" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5632 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29637 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 103.135.136.148 serverIP: 30.138.20.56
Explain this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5632, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "201.247.67.81", "serverIP": "37.10.62.235" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5632 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29637 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 201.247.67.81 serverIP: 37.10.62.235
Explain this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 5632, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 29637, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "213.245.104.212", "serverIP": "21.218.129.148" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 5632 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 29637 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 213.245.104.212 serverIP: 21.218.129.148
Explain this syslog message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 47028, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49886, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "52.90.254.153", "serverIP": "228.244.10.130" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 47028 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49886 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 52.90.254.153 serverIP: 228.244.10.130
Explain this syslog message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 47028, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 49886, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "215.213.160.36", "serverIP": "36.52.53.45" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 47028 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 49886 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 215.213.160.36 serverIP: 36.52.53.45
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36218, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "251.87.50.9", "serverIP": "186.121.193.150" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36218 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 251.87.50.9 serverIP: 186.121.193.150
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36218, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "12.57.222.20", "serverIP": "16.33.155.188" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36218 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 12.57.222.20 serverIP: 16.33.155.188
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36218, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "234.136.95.111", "serverIP": "9.118.99.96" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36218 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 234.136.95.111 serverIP: 9.118.99.96
Explain this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36218, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "2.122.236.230", "serverIP": "229.244.254.64" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36218 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 2.122.236.230 serverIP: 229.244.254.64
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23291, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55276, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "205.246.165.167", "serverIP": "83.213.139.75" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23291 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55276 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 205.246.165.167 serverIP: 83.213.139.75
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23291, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55276, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "11.111.191.138", "serverIP": "9.178.140.31" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23291 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55276 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 11.111.191.138 serverIP: 9.178.140.31
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23291, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55276, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.129.116.48", "serverIP": "214.0.44.255" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23291 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55276 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.129.116.48 serverIP: 214.0.44.255
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23291, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55276, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "115.27.247.203", "serverIP": "203.199.84.49" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23291 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55276 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 115.27.247.203 serverIP: 203.199.84.49
Explain this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3050, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60718, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "79.24.168.252", "serverIP": "59.175.186.69" }
Create a JSON artifact from the message