input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3050 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60718 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 79.24.168.252 serverIP: 59.175.186.69
Explain this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3050, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60718, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "86.135.181.207", "serverIP": "74.214.115.174" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3050 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60718 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 86.135.181.207 serverIP: 74.214.115.174
Explain this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3050, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60718, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "54.211.152.43", "serverIP": "238.88.127.19" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3050 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60718 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 54.211.152.43 serverIP: 238.88.127.19
Explain this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3050, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 60718, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "55.250.101.64", "serverIP": "178.142.95.168" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3050 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 60718 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 55.250.101.64 serverIP: 178.142.95.168
Explain this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32801, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51928, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "128.207.213.156", "serverIP": "241.123.89.20" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32801 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51928 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 128.207.213.156 serverIP: 241.123.89.20
Explain this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32801, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51928, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "141.15.132.185", "serverIP": "89.206.96.253" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32801 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51928 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 141.15.132.185 serverIP: 89.206.96.253
Explain this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32801, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51928, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "51.75.70.59", "serverIP": "56.209.225.68" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32801 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51928 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 51.75.70.59 serverIP: 56.209.225.68
Explain this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32801, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 51928, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "123.224.231.194", "serverIP": "207.88.91.154" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32801 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 51928 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 123.224.231.194 serverIP: 207.88.91.154
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57737, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "185.39.174.17", "serverIP": "219.232.208.63" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57737 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 185.39.174.17 serverIP: 219.232.208.63
Explain this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7510, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57737, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "138.27.111.56", "serverIP": "187.198.236.151" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7510 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57737 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 138.27.111.56 serverIP: 187.198.236.151
Explain this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "127.12.249.233", "serverIP": "72.106.203.21" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 127.12.249.233 serverIP: 72.106.203.21
Explain this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 41733, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "62.196.3.220", "serverIP": "65.62.183.154" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 41733 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 62.196.3.220 serverIP: 65.62.183.154
Explain this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40529, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "50.1.34.173", "serverIP": "107.123.27.214" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40529 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 50.1.34.173 serverIP: 107.123.27.214
Explain this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 40529, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "90.85.159.254", "serverIP": "137.103.252.83" }
Create a JSON artifact from the message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 40529 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 90.85.159.254 serverIP: 137.103.252.83
Explain this syslog message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "164.110.67.23", "serverIP": "56.53.4.156" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 164.110.67.23 serverIP: 56.53.4.156
Explain this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "169.175.184.235", "serverIP": "124.86.72.121" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 169.175.184.235 serverIP: 124.86.72.121
Explain this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "211.106.106.46", "serverIP": "148.205.90.63" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 211.106.106.46 serverIP: 148.205.90.63
Explain this syslog message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "129.245.234.148", "serverIP": "57.185.85.89" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 129.245.234.148 serverIP: 57.185.85.89
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "0.244.34.212", "serverIP": "183.222.110.192" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 0.244.34.212 serverIP: 183.222.110.192
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "134.223.129.108", "serverIP": "253.181.31.57" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 134.223.129.108 serverIP: 253.181.31.57
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "155.44.115.197", "serverIP": "236.118.217.108" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 155.44.115.197 serverIP: 236.118.217.108
Explain this syslog message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "156.167.136.56", "serverIP": "86.12.159.85" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 156.167.136.56 serverIP: 86.12.159.85
Explain this syslog message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "20.143.232.152", "serverIP": "218.197.28.246" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 20.143.232.152 serverIP: 218.197.28.246
Explain this syslog message
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "55.61.90.88", "serverIP": "252.168.159.162" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 55.61.90.88 serverIP: 252.168.159.162
Explain this syslog message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "178.195.47.74", "serverIP": "111.173.219.190" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 178.195.47.74 serverIP: 111.173.219.190
Explain this syslog message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "66.233.94.220", "serverIP": "94.91.156.222" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 66.233.94.220 serverIP: 94.91.156.222
Explain this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "189.152.183.192", "serverIP": "80.120.180.168" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 189.152.183.192 serverIP: 80.120.180.168
Explain this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "145.23.56.66", "serverIP": "224.229.7.147" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 145.23.56.66 serverIP: 224.229.7.147
Explain this syslog message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "125.171.121.144", "serverIP": "211.44.181.90" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 125.171.121.144 serverIP: 211.44.181.90
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "66.206.138.156", "serverIP": "237.243.45.215" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 66.206.138.156 serverIP: 237.243.45.215
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "12.167.195.5", "serverIP": "226.170.69.118" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 12.167.195.5 serverIP: 226.170.69.118
Explain this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "60.134.110.145", "serverIP": "150.119.108.185" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 60.134.110.145 serverIP: 150.119.108.185
Explain this syslog message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "14.57.64.78", "serverIP": "83.76.182.104" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block facilitycode: 20 facilitylabel: local4 messagetype: firewall_action priority: 164 protocol: 1 senderhost: 10.0.0.1 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 14.57.64.78 serverIP: 83.76.182.104
Explain this syslog message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
{ "action": "block", "facilitycode": 20, "facilitylabel": "local4", "message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 164, "protocol": 1, "senderhost": "10.0.0.1", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "119.81.139.93", "serverIP": "89.4.125.19" }
Create a JSON artifact from the message
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message