input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40529,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "247.130.179.204",
"serverIP": "36.108.184.28"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:247.130.179.204/40529 dst dmz-1:36.108.184.28/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40529
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 247.130.179.204
serverIP: 36.108.184.28
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52869,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54380,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "24.230.99.144",
"serverIP": "194.25.188.147"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:24.230.99.144/54380 dst dmz-1:194.25.188.147/52869 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52869
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54380
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 24.230.99.144
serverIP: 194.25.188.147
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52869,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54380,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "176.145.124.197",
"serverIP": "195.71.118.151"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:176.145.124.197/54380 dst dmz-1:195.71.118.151/52869 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52869
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54380
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 176.145.124.197
serverIP: 195.71.118.151
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52869,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54380,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "114.121.234.58",
"serverIP": "43.37.236.28"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:114.121.234.58/54380 dst dmz-1:43.37.236.28/52869 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52869
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54380
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 114.121.234.58
serverIP: 43.37.236.28
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52869,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54380,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "16.175.175.250",
"serverIP": "123.183.202.166"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:09: %ASA-4-106023: Deny tcp src outside:16.175.175.250/54380 dst dmz-1:123.183.202.166/52869 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52869
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54380
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 16.175.175.250
serverIP: 123.183.202.166
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.120.187.232",
"serverIP": "203.215.74.74"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:129.120.187.232/48949 dst dmz-1:203.215.74.74/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.120.187.232
serverIP: 203.215.74.74
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "227.75.206.126",
"serverIP": "203.37.84.165"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:227.75.206.126/48949 dst dmz-1:203.37.84.165/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 227.75.206.126
serverIP: 203.37.84.165
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "171.170.2.226",
"serverIP": "153.228.97.184"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:171.170.2.226/48949 dst dmz-1:153.228.97.184/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 171.170.2.226
serverIP: 153.228.97.184
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "64.230.158.90",
"serverIP": "231.168.128.53"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:13: %ASA-4-106023: Deny tcp src outside:64.230.158.90/48949 dst dmz-1:231.168.128.53/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 64.230.158.90
serverIP: 231.168.128.53
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2375,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41780,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "42.244.39.133",
"serverIP": "57.18.102.220"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:42.244.39.133/41780 dst dmz-1:57.18.102.220/2375 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2375
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41780
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 42.244.39.133
serverIP: 57.18.102.220
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2375,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41780,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "160.114.238.95",
"serverIP": "60.18.173.112"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:160.114.238.95/41780 dst dmz-1:60.18.173.112/2375 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2375
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41780
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 160.114.238.95
serverIP: 60.18.173.112
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 46723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47047,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "22.32.151.181",
"serverIP": "235.149.226.34"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:22.32.151.181/47047 dst dmz-1:235.149.226.34/46723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 46723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47047
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 22.32.151.181
serverIP: 235.149.226.34
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 46723,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47047,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "172.60.166.108",
"serverIP": "109.123.37.72"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:29: %ASA-4-106023: Deny tcp src outside:172.60.166.108/47047 dst dmz-1:109.123.37.72/46723 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 46723
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47047
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 172.60.166.108
serverIP: 109.123.37.72
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2375,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41780,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "80.2.85.81",
"serverIP": "21.10.152.23"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:80.2.85.81/41780 dst dmz-1:21.10.152.23/2375 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2375
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41780
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 80.2.85.81
serverIP: 21.10.152.23
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2375,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41780,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "89.125.25.168",
"serverIP": "237.175.49.177"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:19: %ASA-4-106023: Deny tcp src outside:89.125.25.168/41780 dst dmz-1:237.175.49.177/2375 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2375
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41780
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 89.125.25.168
serverIP: 237.175.49.177
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12100,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55752,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "120.205.73.181",
"serverIP": "82.171.195.253"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:120.205.73.181/55752 dst dmz-1:82.171.195.253/12100 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12100
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55752
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 120.205.73.181
serverIP: 82.171.195.253
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12100,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55752,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "138.69.188.32",
"serverIP": "88.48.157.168"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:138.69.188.32/55752 dst dmz-1:88.48.157.168/12100 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12100
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55752
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 138.69.188.32
serverIP: 88.48.157.168
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12100,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55752,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "95.223.5.215",
"serverIP": "5.217.215.170"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:95.223.5.215/55752 dst dmz-1:5.217.215.170/12100 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12100
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55752
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 95.223.5.215
serverIP: 5.217.215.170
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12100,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55752,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "59.152.11.7",
"serverIP": "10.38.38.16"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:09: %ASA-4-106023: Deny tcp src outside:59.152.11.7/55752 dst dmz-1:10.38.38.16/12100 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12100
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55752
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 59.152.11.7
serverIP: 10.38.38.16
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5632,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "8.205.148.151",
"serverIP": "119.203.218.202"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:8.205.148.151/29637 dst dmz-1:119.203.218.202/5632 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5632
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29637
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 8.205.148.151
serverIP: 119.203.218.202
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5632,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "103.135.136.148",
"serverIP": "30.138.20.56"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:103.135.136.148/29637 dst dmz-1:30.138.20.56/5632 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5632
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29637
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 103.135.136.148
serverIP: 30.138.20.56
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5632,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "201.247.67.81",
"serverIP": "37.10.62.235"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:201.247.67.81/29637 dst dmz-1:37.10.62.235/5632 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5632
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29637
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 201.247.67.81
serverIP: 37.10.62.235
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5632,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 29637,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "213.245.104.212",
"serverIP": "21.218.129.148"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:51: %ASA-4-106023: Deny udp src outside:213.245.104.212/29637 dst dmz-1:21.218.129.148/5632 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5632
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 29637
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 213.245.104.212
serverIP: 21.218.129.148
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47028,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49886,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "52.90.254.153",
"serverIP": "228.244.10.130"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:228.244.10.130/47028 dst dmz-1:52.90.254.153/49886 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47028
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49886
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 52.90.254.153
serverIP: 228.244.10.130
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47028,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 49886,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "215.213.160.36",
"serverIP": "36.52.53.45"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:03: %ASA-4-106023: Deny tcp src outside:36.52.53.45/47028 dst dmz-1:215.213.160.36/49886 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47028
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 49886
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 215.213.160.36
serverIP: 36.52.53.45
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36218,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "251.87.50.9",
"serverIP": "186.121.193.150"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:251.87.50.9/36218 dst dmz-1:186.121.193.150/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36218
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 251.87.50.9
serverIP: 186.121.193.150
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36218,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "12.57.222.20",
"serverIP": "16.33.155.188"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:12.57.222.20/36218 dst dmz-1:16.33.155.188/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36218
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 12.57.222.20
serverIP: 16.33.155.188
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36218,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "234.136.95.111",
"serverIP": "9.118.99.96"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:234.136.95.111/36218 dst dmz-1:9.118.99.96/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36218
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 234.136.95.111
serverIP: 9.118.99.96
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36218,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.122.236.230",
"serverIP": "229.244.254.64"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:07: %ASA-4-106023: Deny tcp src outside:2.122.236.230/36218 dst dmz-1:229.244.254.64/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36218
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.122.236.230
serverIP: 229.244.254.64
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23291,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55276,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "205.246.165.167",
"serverIP": "83.213.139.75"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:205.246.165.167/55276 dst dmz-1:83.213.139.75/23291 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23291
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55276
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 205.246.165.167
serverIP: 83.213.139.75
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23291,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55276,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.111.191.138",
"serverIP": "9.178.140.31"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:11.111.191.138/55276 dst dmz-1:9.178.140.31/23291 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23291
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55276
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.111.191.138
serverIP: 9.178.140.31
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23291,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55276,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.129.116.48",
"serverIP": "214.0.44.255"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:240.129.116.48/55276 dst dmz-1:214.0.44.255/23291 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23291
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55276
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.129.116.48
serverIP: 214.0.44.255
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23291,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55276,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "115.27.247.203",
"serverIP": "203.199.84.49"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:115.27.247.203/55276 dst dmz-1:203.199.84.49/23291 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23291
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55276
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 115.27.247.203
serverIP: 203.199.84.49
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3050,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60718,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.24.168.252",
"serverIP": "59.175.186.69"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.