input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 56444, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 1433, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "158.7.144.149", "serverIP": "105.226.81.148" }
Create a JSON artifact from the message
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 56444 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 1433 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 158.7.144.149 serverIP: 105.226.81.148
Explain this syslog message
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 56444, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 1433, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "0.54.210.16", "serverIP": "90.134.179.236" }
Create a JSON artifact from the message
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 56444 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 1433 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 0.54.210.16 serverIP: 90.134.179.236
Explain this syslog message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 51748, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3853, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "147.60.141.86", "serverIP": "237.96.94.136" }
Create a JSON artifact from the message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 51748 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3853 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 147.60.141.86 serverIP: 237.96.94.136
Explain this syslog message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 51748, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 3853, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "51.141.214.179", "serverIP": "110.47.13.91" }
Create a JSON artifact from the message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 51748 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 3853 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 51.141.214.179 serverIP: 110.47.13.91
Explain this syslog message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 56562, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 35843, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "96.117.132.243", "serverIP": "122.138.80.219" }
Create a JSON artifact from the message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 56562 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 35843 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 96.117.132.243 serverIP: 122.138.80.219
Explain this syslog message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 56562, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 35843, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "247.112.208.247", "serverIP": "213.144.38.55" }
Create a JSON artifact from the message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 56562 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 35843 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 247.112.208.247 serverIP: 213.144.38.55
Explain this syslog message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 24372, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 9092, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "127.69.176.144", "serverIP": "169.215.145.129" }
Create a JSON artifact from the message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 24372 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9092 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 127.69.176.144 serverIP: 169.215.145.129
Explain this syslog message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
{ "action": "block", "clientport": 24372, "facilitycode": 22, "facilitylabel": "local6", "message": "<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group \"outside_access_in\" [0x0, 0x0]\n", "messagetype": "firewall_action", "priority": 180, "protocol": 6, "senderhost": "172.20.1.1", "sensitivity": "normal", "serverport": 9092, "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "vendorcode": "ASA-4-106023", "streamName": "cisco_asa", "clientIP": "248.37.153.197", "serverIP": "48.1.169.140" }
Create a JSON artifact from the message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: action: block clientport: 24372 facilitycode: 22 facilitylabel: local6 messagetype: firewall_action priority: 180 protocol: 6 senderhost: 172.20.1.1 sensitivity: normal serverport: 9092 severitycode: 4 severitylabel: warning sourceinfo: unknown tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] vendorcode: ASA-4-106023 streamName: cisco_asa clientIP: 248.37.153.197 serverIP: 48.1.169.140
Explain this syslog message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 31768, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48692, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "192.74.8.229", "serverIP": "160.88.231.227" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 31768 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48692 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 192.74.8.229 serverIP: 160.88.231.227
Explain this syslog message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 31768, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48692, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "177.42.190.184", "serverIP": "223.202.161.97" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 31768 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48692 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 177.42.190.184 serverIP: 223.202.161.97
Explain this syslog message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 10001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59211, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "71.211.238.160", "serverIP": "212.133.219.114" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 10001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59211 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 71.211.238.160 serverIP: 212.133.219.114
Explain this syslog message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 10001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 59211, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "104.164.216.80", "serverIP": "156.86.103.62" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 10001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 59211 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 104.164.216.80 serverIP: 156.86.103.62
Explain this syslog message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43786, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "230.227.149.189", "serverIP": "149.2.244.10" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43786 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 230.227.149.189 serverIP: 149.2.244.10
Explain this syslog message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 27001, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43786, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "150.227.43.79", "serverIP": "79.255.236.20" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 27001 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43786 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 150.227.43.79 serverIP: 79.255.236.20
Explain this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2546, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "76.252.139.150", "serverIP": "141.142.90.10" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2546 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 76.252.139.150 serverIP: 141.142.90.10
Explain this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2546, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.77.113.224", "serverIP": "148.119.213.14" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2546 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.77.113.224 serverIP: 148.119.213.14
Explain this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2546, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "118.149.71.127", "serverIP": "52.201.233.53" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2546 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 118.149.71.127 serverIP: 52.201.233.53
Explain this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2546, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61953, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "2.23.196.196", "serverIP": "113.234.243.40" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2546 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61953 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 2.23.196.196 serverIP: 113.234.243.40
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "154.218.91.21", "serverIP": "41.51.12.87" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 154.218.91.21 serverIP: 41.51.12.87
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "41.148.244.93", "serverIP": "16.129.73.33" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 41.148.244.93 serverIP: 16.129.73.33
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "179.249.183.133", "serverIP": "0.174.58.104" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 179.249.183.133 serverIP: 0.174.58.104
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "202.10.105.154", "serverIP": "88.187.72.158" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 202.10.105.154 serverIP: 88.187.72.158
Explain this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "182.134.12.240", "serverIP": "212.229.32.46" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25565 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56808 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 182.134.12.240 serverIP: 212.229.32.46
Explain this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "2.230.106.139", "serverIP": "120.44.107.86" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25565 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56808 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 2.230.106.139 serverIP: 120.44.107.86
Explain this syslog message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "216.252.190.205", "serverIP": "182.35.19.207" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25565 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56808 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 216.252.190.205 serverIP: 182.35.19.207
Explain this syslog message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "23.106.55.24", "serverIP": "206.232.118.196" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25565 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56808 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 23.106.55.24 serverIP: 206.232.118.196
Explain this syslog message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31749, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "233.216.122.63", "serverIP": "160.132.1.2" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31749 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 233.216.122.63 serverIP: 160.132.1.2
Explain this syslog message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31749, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "229.58.21.193", "serverIP": "30.79.186.3" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31749 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 229.58.21.193 serverIP: 30.79.186.3
Explain this syslog message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2255, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "139.109.188.215", "serverIP": "1.132.114.106" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2255 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 139.109.188.215 serverIP: 1.132.114.106
Explain this syslog message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 2255, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 32629, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "12.105.187.48", "serverIP": "210.82.46.40" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 2255 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 32629 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 12.105.187.48 serverIP: 210.82.46.40
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "240.55.255.124", "serverIP": "186.124.233.144" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 240.55.255.124 serverIP: 186.124.233.144
Explain this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 18080, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 31331, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "52.164.191.16", "serverIP": "208.190.189.80" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 18080 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 31331 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 52.164.191.16 serverIP: 208.190.189.80
Explain this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "192.68.51.94", "serverIP": "222.29.190.101" }
Create a JSON artifact from the message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 25565 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56808 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 192.68.51.94 serverIP: 222.29.190.101
Explain this syslog message
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 25565, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56808, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "144.202.41.117", "serverIP": "89.174.132.53" }
Create a JSON artifact from the message