input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:79.24.168.252/60718 dst dmz-1:59.175.186.69/3050 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3050
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60718
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.24.168.252
serverIP: 59.175.186.69
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3050,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60718,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "86.135.181.207",
"serverIP": "74.214.115.174"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:86.135.181.207/60718 dst dmz-1:74.214.115.174/3050 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3050
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60718
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 86.135.181.207
serverIP: 74.214.115.174
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3050,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60718,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "54.211.152.43",
"serverIP": "238.88.127.19"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:54.211.152.43/60718 dst dmz-1:238.88.127.19/3050 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3050
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60718
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 54.211.152.43
serverIP: 238.88.127.19
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3050,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60718,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "55.250.101.64",
"serverIP": "178.142.95.168"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:16: %ASA-4-106023: Deny tcp src outside:55.250.101.64/60718 dst dmz-1:178.142.95.168/3050 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3050
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60718
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 55.250.101.64
serverIP: 178.142.95.168
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32801,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51928,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "128.207.213.156",
"serverIP": "241.123.89.20"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:128.207.213.156/51928 dst dmz-1:241.123.89.20/32801 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32801
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51928
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 128.207.213.156
serverIP: 241.123.89.20
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32801,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51928,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.15.132.185",
"serverIP": "89.206.96.253"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:141.15.132.185/51928 dst dmz-1:89.206.96.253/32801 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32801
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51928
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.15.132.185
serverIP: 89.206.96.253
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32801,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51928,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "51.75.70.59",
"serverIP": "56.209.225.68"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:51.75.70.59/51928 dst dmz-1:56.209.225.68/32801 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32801
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51928
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 51.75.70.59
serverIP: 56.209.225.68
|
Explain this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32801,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 51928,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.224.231.194",
"serverIP": "207.88.91.154"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:26:58: %ASA-4-106023: Deny tcp src outside:123.224.231.194/51928 dst dmz-1:207.88.91.154/32801 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32801
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 51928
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.224.231.194
serverIP: 207.88.91.154
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57737,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "185.39.174.17",
"serverIP": "219.232.208.63"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:185.39.174.17/57737 dst dmz-1:219.232.208.63/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57737
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 185.39.174.17
serverIP: 219.232.208.63
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7510,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57737,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "138.27.111.56",
"serverIP": "187.198.236.151"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:19: %ASA-4-106023: Deny tcp src outside:138.27.111.56/57737 dst dmz-1:187.198.236.151/7510 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7510
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57737
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 138.27.111.56
serverIP: 187.198.236.151
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "127.12.249.233",
"serverIP": "72.106.203.21"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:127.12.249.233/41733 dst dmz-1:72.106.203.21/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 127.12.249.233
serverIP: 72.106.203.21
|
Explain this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 41733,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "62.196.3.220",
"serverIP": "65.62.183.154"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:27:43: %ASA-4-106023: Deny tcp src outside:62.196.3.220/41733 dst dmz-1:65.62.183.154/8080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 41733
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 62.196.3.220
serverIP: 65.62.183.154
|
Explain this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40529,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.1.34.173",
"serverIP": "107.123.27.214"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:50.1.34.173/40529 dst dmz-1:107.123.27.214/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40529
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.1.34.173
serverIP: 107.123.27.214
|
Explain this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40529,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "90.85.159.254",
"serverIP": "137.103.252.83"
}
|
Create a JSON artifact from the message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 17 2023 18:28:07: %ASA-4-106023: Deny tcp src outside:90.85.159.254/40529 dst dmz-1:137.103.252.83/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40529
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 90.85.159.254
serverIP: 137.103.252.83
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "164.110.67.23",
"serverIP": "56.53.4.156"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:164.110.67.23 dst outside:56.53.4.156 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 164.110.67.23
serverIP: 56.53.4.156
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "169.175.184.235",
"serverIP": "124.86.72.121"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:169.175.184.235 dst outside:124.86.72.121 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 169.175.184.235
serverIP: 124.86.72.121
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "211.106.106.46",
"serverIP": "148.205.90.63"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:211.106.106.46 dst outside:148.205.90.63 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 211.106.106.46
serverIP: 148.205.90.63
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "129.245.234.148",
"serverIP": "57.185.85.89"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:129.245.234.148 dst outside:57.185.85.89 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 129.245.234.148
serverIP: 57.185.85.89
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "0.244.34.212",
"serverIP": "183.222.110.192"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:0.244.34.212 dst outside:183.222.110.192 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 0.244.34.212
serverIP: 183.222.110.192
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "134.223.129.108",
"serverIP": "253.181.31.57"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:134.223.129.108 dst outside:253.181.31.57 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 134.223.129.108
serverIP: 253.181.31.57
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "155.44.115.197",
"serverIP": "236.118.217.108"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:155.44.115.197 dst outside:236.118.217.108 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 155.44.115.197
serverIP: 236.118.217.108
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "156.167.136.56",
"serverIP": "86.12.159.85"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:156.167.136.56 dst outside:86.12.159.85 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 156.167.136.56
serverIP: 86.12.159.85
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "20.143.232.152",
"serverIP": "218.197.28.246"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:20.143.232.152 dst outside:218.197.28.246 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 20.143.232.152
serverIP: 218.197.28.246
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "55.61.90.88",
"serverIP": "252.168.159.162"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:55.61.90.88 dst outside:252.168.159.162 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 55.61.90.88
serverIP: 252.168.159.162
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "178.195.47.74",
"serverIP": "111.173.219.190"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:178.195.47.74 dst outside:111.173.219.190 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 178.195.47.74
serverIP: 111.173.219.190
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "66.233.94.220",
"serverIP": "94.91.156.222"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:41: %ASA-4-106023: Deny icmp src dmz-1:66.233.94.220 dst outside:94.91.156.222 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 66.233.94.220
serverIP: 94.91.156.222
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "189.152.183.192",
"serverIP": "80.120.180.168"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:189.152.183.192 dst outside:80.120.180.168 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 189.152.183.192
serverIP: 80.120.180.168
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "145.23.56.66",
"serverIP": "224.229.7.147"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:39: %ASA-4-106023: Deny icmp src dmz-1:145.23.56.66 dst outside:224.229.7.147 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 145.23.56.66
serverIP: 224.229.7.147
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "125.171.121.144",
"serverIP": "211.44.181.90"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:38: %ASA-4-106023: Deny icmp src dmz-1:125.171.121.144 dst outside:211.44.181.90 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 125.171.121.144
serverIP: 211.44.181.90
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "66.206.138.156",
"serverIP": "237.243.45.215"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:66.206.138.156 dst outside:237.243.45.215 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 66.206.138.156
serverIP: 237.243.45.215
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "12.167.195.5",
"serverIP": "226.170.69.118"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:12.167.195.5 dst outside:226.170.69.118 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 12.167.195.5
serverIP: 226.170.69.118
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "60.134.110.145",
"serverIP": "150.119.108.185"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:37: %ASA-4-106023: Deny icmp src dmz-1:60.134.110.145 dst outside:150.119.108.185 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 60.134.110.145
serverIP: 150.119.108.185
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "14.57.64.78",
"serverIP": "83.76.182.104"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:34: %ASA-4-106023: Deny icmp src dmz-1:14.57.64.78 dst outside:83.76.182.104 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 14.57.64.78
serverIP: 83.76.182.104
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "119.81.139.93",
"serverIP": "89.4.125.19"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.