input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Aug 15 2023 14:27:32: %ASA-4-106023: Deny icmp src dmz-1:119.81.139.93 dst outside:89.4.125.19 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 119.81.139.93
serverIP: 89.4.125.19
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:239.74.227.112 dst outside:229.41.255.44 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:239.74.227.112 dst outside:229.41.255.44 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "239.74.227.112",
"serverIP": "229.41.255.44"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:239.74.227.112 dst outside:229.41.255.44 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:239.74.227.112 dst outside:229.41.255.44 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 239.74.227.112
serverIP: 229.41.255.44
|
Explain this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:236.160.249.1 dst outside:234.65.116.28 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:236.160.249.1 dst outside:234.65.116.28 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "236.160.249.1",
"serverIP": "234.65.116.28"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:236.160.249.1 dst outside:234.65.116.28 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:27:31: %ASA-4-106023: Deny icmp src dmz-1:236.160.249.1 dst outside:234.65.116.28 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 236.160.249.1
serverIP: 234.65.116.28
|
Explain this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:4.144.84.200 dst outside:55.55.44.99 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:4.144.84.200 dst outside:55.55.44.99 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "4.144.84.200",
"serverIP": "55.55.44.99"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:4.144.84.200 dst outside:55.55.44.99 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:4.144.84.200 dst outside:55.55.44.99 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 4.144.84.200
serverIP: 55.55.44.99
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:23.231Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:23.397Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.umbrella.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"umbrella\",\"senderHost\":\"EventSentry1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.umbrella.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951679,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "101.49.15.147",
"serverIP": "183.137.63.62"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:101.49.15.147 dst outside:183.137.63.62 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 101.49.15.147
serverIP: 183.137.63.62
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:19.605Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:20.313Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.umbrella.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"umbrella\",\"senderHost\":\"EventSentry1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.umbrella.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951580,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "105.15.130.164",
"serverIP": "39.184.109.123"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:105.15.130.164 dst outside:39.184.109.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 105.15.130.164
serverIP: 39.184.109.123
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:182.65.122.3 dst outside:182.175.163.178 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:182.65.122.3 dst outside:182.175.163.178 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "182.65.122.3",
"serverIP": "182.175.163.178"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:182.65.122.3 dst outside:182.175.163.178 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:182.65.122.3 dst outside:182.175.163.178 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 182.65.122.3
serverIP: 182.175.163.178
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:119.214.65.148 dst outside:22.163.177.70 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:119.214.65.148 dst outside:22.163.177.70 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "119.214.65.148",
"serverIP": "22.163.177.70"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:119.214.65.148 dst outside:22.163.177.70 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:119.214.65.148 dst outside:22.163.177.70 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 119.214.65.148
serverIP: 22.163.177.70
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:63.233.165.197 dst outside:21.188.237.2 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:63.233.165.197 dst outside:21.188.237.2 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "63.233.165.197",
"serverIP": "21.188.237.2"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:63.233.165.197 dst outside:21.188.237.2 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:63.233.165.197 dst outside:21.188.237.2 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 63.233.165.197
serverIP: 21.188.237.2
|
Explain this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:98.147.93.105 dst outside:46.57.245.25 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:98.147.93.105 dst outside:46.57.245.25 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "98.147.93.105",
"serverIP": "46.57.245.25"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:98.147.93.105 dst outside:46.57.245.25 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:98.147.93.105 dst outside:46.57.245.25 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 98.147.93.105
serverIP: 46.57.245.25
|
Explain this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:25.26.238.99 dst outside:206.253.1.132 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:25.26.238.99 dst outside:206.253.1.132 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "25.26.238.99",
"serverIP": "206.253.1.132"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:25.26.238.99 dst outside:206.253.1.132 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:25.26.238.99 dst outside:206.253.1.132 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 25.26.238.99
serverIP: 206.253.1.132
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:23.231Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:23.397Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.stark.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"stark\",\"senderHost\":\"EventSentry1.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.stark.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951679,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "253.108.116.13",
"serverIP": "87.196.233.140"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:253.108.116.13 dst outside:87.196.233.140 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 253.108.116.13
serverIP: 87.196.233.140
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.oscorp.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"oscorp","senderHost":"EventSentry1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.oscorp.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:19.605Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:20.313Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.oscorp.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"oscorp\",\"senderHost\":\"EventSentry1.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.oscorp.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951580,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "172.62.215.211",
"serverIP": "79.121.246.127"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.oscorp.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"oscorp","senderHost":"EventSentry1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.oscorp.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.oscorp.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"oscorp","senderHost":"EventSentry1.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.oscorp.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:172.62.215.211 dst outside:79.121.246.127 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 172.62.215.211
serverIP: 79.121.246.127
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:77.211.18.104 dst outside:244.249.119.244 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:77.211.18.104 dst outside:244.249.119.244 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "77.211.18.104",
"serverIP": "244.249.119.244"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:77.211.18.104 dst outside:244.249.119.244 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:77.211.18.104 dst outside:244.249.119.244 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 77.211.18.104
serverIP: 244.249.119.244
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:51.78.127.191 dst outside:187.187.45.72 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:51.78.127.191 dst outside:187.187.45.72 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "51.78.127.191",
"serverIP": "187.187.45.72"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:51.78.127.191 dst outside:187.187.45.72 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:51.78.127.191 dst outside:187.187.45.72 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 51.78.127.191
serverIP: 187.187.45.72
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:102.172.61.44 dst outside:27.40.21.61 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:102.172.61.44 dst outside:27.40.21.61 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "102.172.61.44",
"serverIP": "27.40.21.61"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:102.172.61.44 dst outside:27.40.21.61 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:102.172.61.44 dst outside:27.40.21.61 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 102.172.61.44
serverIP: 27.40.21.61
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:23.231Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:23.397Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.umbrella.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"umbrella\",\"senderHost\":\"EventSentry1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.umbrella.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951679,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "5.12.23.34",
"serverIP": "34.247.86.30"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:5.12.23.34 dst outside:34.247.86.30 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 5.12.23.34
serverIP: 34.247.86.30
|
Explain this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:49.19.111.77 dst outside:71.147.45.123 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:49.19.111.77 dst outside:71.147.45.123 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "49.19.111.77",
"serverIP": "71.147.45.123"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:49.19.111.77 dst outside:71.147.45.123 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:44:09: %ASA-4-106023: Deny icmp src dmz-1:49.19.111.77 dst outside:71.147.45.123 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 49.19.111.77
serverIP: 71.147.45.123
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:23.231Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:23.397Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.stark.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"stark\",\"senderHost\":\"EventSentry1.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.stark.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951679,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "28.214.235.211",
"serverIP": "21.40.86.87"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:23.231Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:23.397Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.stark.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"stark","senderHost":"EventSentry1.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.stark.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:44:02: %ASA-4-106023: Deny icmp src dmz-1:28.214.235.211 dst outside:21.40.86.87 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951679,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 28.214.235.211
serverIP: 21.40.86.87
|
Explain this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
{
"action": "block",
"facilitycode": 1,
"facilitylabel": "user-level",
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2023-08-15T20:38:19.605Z\",\"agent\":{\"ephemeral_id\":\"58f5da08-4b66-497e-b13a-b9936e61eb18\",\"id\":\"106936a2-47e9-46b2-81b6-e23a3752c9b3\",\"name\":\"EventSentry1\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Syslog\",\"code\":\"500\",\"created\":\"2023-08-15T20:38:20.313Z\",\"kind\":\"event\",\"provider\":\"EventSentry Network Services\"},\"host\":{\"name\":\"EventSentry1.umbrella.org\"},\"log\":{\"level\":\"warning\"},\"message\":\"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\",\"organization\":\"umbrella\",\"senderHost\":\"EventSentry1.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Application\",\"computer_name\":\"EventSentry1.umbrella.org\",\"event_data\":{\"param1\":\"10.0.0.1\",\"param2\":\"local4\",\"param3\":\"warning\",\"param4\":\"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \\\"dmz_access_in\\\" [0x0, 0x0]\"},\"event_id\":\"500\",\"keywords\":[\"Classic\"],\"opcode\":\"Info\",\"provider_name\":\"EventSentry Network Services\",\"record_id\":1951580,\"task\":\"Syslog\"}}",
"messagetype": "firewall_action",
"priority": 13,
"protocol": 1,
"senderhost": "EventSentry1.uwca.org",
"sensitivity": "normal",
"severitycode": 5,
"severitylabel": "notice",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "34.42.2.232",
"serverIP": "163.66.38.69"
}
|
Create a JSON artifact from the message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2023-08-15T20:38:19.605Z","agent":{"ephemeral_id":"58f5da08-4b66-497e-b13a-b9936e61eb18","id":"106936a2-47e9-46b2-81b6-e23a3752c9b3","name":"EventSentry1","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Syslog","code":"500","created":"2023-08-15T20:38:20.313Z","kind":"event","provider":"EventSentry Network Services"},"host":{"name":"EventSentry1.umbrella.org"},"log":{"level":"warning"},"message":"syslog@10.0.0.1[local4.warning]: Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]","organization":"umbrella","senderHost":"EventSentry1.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Application","computer_name":"EventSentry1.umbrella.org","event_data":{"param1":"10.0.0.1","param2":"local4","param3":"warning","param4":"Aug 15 2023 14:43:59: %ASA-4-106023: Deny icmp src dmz-1:34.42.2.232 dst outside:163.66.38.69 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]"},"event_id":"500","keywords":["Classic"],"opcode":"Info","provider_name":"EventSentry Network Services","record_id":1951580,"task":"Syslog"}}
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 1
facilitylabel: user-level
messagetype: firewall_action
priority: 13
protocol: 1
senderhost: EventSentry1.uwca.org
sensitivity: normal
severitycode: 5
severitylabel: notice
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 34.42.2.232
serverIP: 163.66.38.69
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:137.59.203.117 dst outside:8.227.171.214 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:137.59.203.117 dst outside:8.227.171.214 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "137.59.203.117",
"serverIP": "8.227.171.214"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:137.59.203.117 dst outside:8.227.171.214 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:137.59.203.117 dst outside:8.227.171.214 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 137.59.203.117
serverIP: 8.227.171.214
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:174.149.225.12 dst outside:163.26.222.248 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:174.149.225.12 dst outside:163.26.222.248 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "174.149.225.12",
"serverIP": "163.26.222.248"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:174.149.225.12 dst outside:163.26.222.248 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:55: %ASA-4-106023: Deny icmp src dmz-1:174.149.225.12 dst outside:163.26.222.248 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 174.149.225.12
serverIP: 163.26.222.248
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:169.72.170.12 dst outside:0.96.170.163 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:169.72.170.12 dst outside:0.96.170.163 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "169.72.170.12",
"serverIP": "0.96.170.163"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:169.72.170.12 dst outside:0.96.170.163 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:54: %ASA-4-106023: Deny icmp src dmz-1:169.72.170.12 dst outside:0.96.170.163 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 169.72.170.12
serverIP: 0.96.170.163
|
Explain this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:67.185.156.49 dst outside:246.226.126.14 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
{
"action": "block",
"facilitycode": 20,
"facilitylabel": "local4",
"message": "<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:67.185.156.49 dst outside:246.226.126.14 (type 3, code 3) by access-group \"dmz_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 164,
"protocol": 1,
"senderhost": "10.0.0.1",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "67.185.156.49",
"serverIP": "246.226.126.14"
}
|
Create a JSON artifact from the message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:67.185.156.49 dst outside:246.226.126.14 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 15 2023 14:43:57: %ASA-4-106023: Deny icmp src dmz-1:67.185.156.49 dst outside:246.226.126.14 (type 3, code 3) by access-group "dmz_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
facilitycode: 20
facilitylabel: local4
messagetype: firewall_action
priority: 164
protocol: 1
senderhost: 10.0.0.1
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 67.185.156.49
serverIP: 246.226.126.14
|
Explain this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:241.93.84.12/49919 dst DMZ:237.24.4.223/5061 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49919,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:241.93.84.12/49919 dst DMZ:237.24.4.223/5061 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5061,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "241.93.84.12",
"serverIP": "237.24.4.223"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:241.93.84.12/49919 dst DMZ:237.24.4.223/5061 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:241.93.84.12/49919 dst DMZ:237.24.4.223/5061 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49919
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5061
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 241.93.84.12
serverIP: 237.24.4.223
|
Explain this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:182.64.140.138/49919 dst DMZ:8.25.148.244/5061 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49919,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:182.64.140.138/49919 dst DMZ:8.25.148.244/5061 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5061,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "182.64.140.138",
"serverIP": "8.25.148.244"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:182.64.140.138/49919 dst DMZ:8.25.148.244/5061 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:182.64.140.138/49919 dst DMZ:8.25.148.244/5061 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49919
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5061
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 182.64.140.138
serverIP: 8.25.148.244
|
Explain this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:133.181.231.250/49919 dst DMZ:149.249.45.117/5061 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49919,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:133.181.231.250/49919 dst DMZ:149.249.45.117/5061 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5061,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "133.181.231.250",
"serverIP": "149.249.45.117"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:133.181.231.250/49919 dst DMZ:149.249.45.117/5061 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:133.181.231.250/49919 dst DMZ:149.249.45.117/5061 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49919
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5061
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 133.181.231.250
serverIP: 149.249.45.117
|
Explain this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:64.77.163.67/49919 dst DMZ:170.160.59.23/5061 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 49919,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:64.77.163.67/49919 dst DMZ:170.160.59.23/5061 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5061,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "64.77.163.67",
"serverIP": "170.160.59.23"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:64.77.163.67/49919 dst DMZ:170.160.59.23/5061 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:12: %ASA-4-106023: Deny tcp src outside:64.77.163.67/49919 dst DMZ:170.160.59.23/5061 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 49919
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5061
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 64.77.163.67
serverIP: 170.160.59.23
|
Explain this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:152.195.127.182/45724 dst DMZ:184.94.97.131/5901 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45724,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:152.195.127.182/45724 dst DMZ:184.94.97.131/5901 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5901,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "152.195.127.182",
"serverIP": "184.94.97.131"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:152.195.127.182/45724 dst DMZ:184.94.97.131/5901 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:152.195.127.182/45724 dst DMZ:184.94.97.131/5901 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45724
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5901
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 152.195.127.182
serverIP: 184.94.97.131
|
Explain this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:201.138.81.82/45724 dst DMZ:73.78.124.200/5901 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45724,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:201.138.81.82/45724 dst DMZ:73.78.124.200/5901 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5901,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "201.138.81.82",
"serverIP": "73.78.124.200"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:201.138.81.82/45724 dst DMZ:73.78.124.200/5901 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:201.138.81.82/45724 dst DMZ:73.78.124.200/5901 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45724
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5901
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 201.138.81.82
serverIP: 73.78.124.200
|
Explain this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:251.107.42.247/45724 dst DMZ:71.204.247.174/5901 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45724,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:251.107.42.247/45724 dst DMZ:71.204.247.174/5901 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5901,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "251.107.42.247",
"serverIP": "71.204.247.174"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:251.107.42.247/45724 dst DMZ:71.204.247.174/5901 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:251.107.42.247/45724 dst DMZ:71.204.247.174/5901 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45724
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5901
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 251.107.42.247
serverIP: 71.204.247.174
|
Explain this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:58.144.55.46/45724 dst DMZ:129.220.122.238/5901 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 45724,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:58.144.55.46/45724 dst DMZ:129.220.122.238/5901 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 5901,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "58.144.55.46",
"serverIP": "129.220.122.238"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:58.144.55.46/45724 dst DMZ:129.220.122.238/5901 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:11: %ASA-4-106023: Deny tcp src outside:58.144.55.46/45724 dst DMZ:129.220.122.238/5901 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 45724
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 5901
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 58.144.55.46
serverIP: 129.220.122.238
|
Explain this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:92.235.70.77/56444 dst DMZ:145.9.89.6/1433 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56444,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:92.235.70.77/56444 dst DMZ:145.9.89.6/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "92.235.70.77",
"serverIP": "145.9.89.6"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:92.235.70.77/56444 dst DMZ:145.9.89.6/1433 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:92.235.70.77/56444 dst DMZ:145.9.89.6/1433 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56444
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1433
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 92.235.70.77
serverIP: 145.9.89.6
|
Explain this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:239.64.198.126/56444 dst DMZ:37.225.97.64/1433 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56444,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:239.64.198.126/56444 dst DMZ:37.225.97.64/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "239.64.198.126",
"serverIP": "37.225.97.64"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:239.64.198.126/56444 dst DMZ:37.225.97.64/1433 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:239.64.198.126/56444 dst DMZ:37.225.97.64/1433 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56444
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1433
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 239.64.198.126
serverIP: 37.225.97.64
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.