input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56444,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "158.7.144.149",
"serverIP": "105.226.81.148"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:158.7.144.149/56444 dst DMZ:105.226.81.148/1433 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56444
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1433
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 158.7.144.149
serverIP: 105.226.81.148
|
Explain this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56444,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 1433,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "0.54.210.16",
"serverIP": "90.134.179.236"
}
|
Create a JSON artifact from the message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 25 2023 18:13:10: %ASA-4-106023: Deny tcp src outside:0.54.210.16/56444 dst DMZ:90.134.179.236/1433 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56444
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 1433
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 0.54.210.16
serverIP: 90.134.179.236
|
Explain this syslog message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 51748,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3853,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "147.60.141.86",
"serverIP": "237.96.94.136"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:147.60.141.86/51748 dst DMZ:237.96.94.136/3853 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 51748
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3853
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 147.60.141.86
serverIP: 237.96.94.136
|
Explain this syslog message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 51748,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 3853,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "51.141.214.179",
"serverIP": "110.47.13.91"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:47:02: %ASA-4-106023: Deny tcp src outside:51.141.214.179/51748 dst DMZ:110.47.13.91/3853 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 51748
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 3853
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 51.141.214.179
serverIP: 110.47.13.91
|
Explain this syslog message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56562,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35843,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "96.117.132.243",
"serverIP": "122.138.80.219"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:122.138.80.219/35843 dst inside:96.117.132.243/56562 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56562
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35843
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 96.117.132.243
serverIP: 122.138.80.219
|
Explain this syslog message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 56562,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 35843,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "247.112.208.247",
"serverIP": "213.144.38.55"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:46:35: %ASA-4-106023: Deny tcp src outside:213.144.38.55/35843 dst inside:247.112.208.247/56562 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 56562
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 35843
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 247.112.208.247
serverIP: 213.144.38.55
|
Explain this syslog message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 24372,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9092,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "127.69.176.144",
"serverIP": "169.215.145.129"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:127.69.176.144/24372 dst DMZ:169.215.145.129/9092 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 24372
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9092
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 127.69.176.144
serverIP: 169.215.145.129
|
Explain this syslog message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
|
{
"action": "block",
"clientport": 24372,
"facilitycode": 22,
"facilitylabel": "local6",
"message": "<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"messagetype": "firewall_action",
"priority": 180,
"protocol": 6,
"senderhost": "172.20.1.1",
"sensitivity": "normal",
"serverport": 9092,
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"vendorcode": "ASA-4-106023",
"streamName": "cisco_asa",
"clientIP": "248.37.153.197",
"serverIP": "48.1.169.140"
}
|
Create a JSON artifact from the message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<180>May 29 2023 15:19:14: %ASA-4-106023: Deny tcp src outside:248.37.153.197/24372 dst DMZ:48.1.169.140/9092 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
action: block
clientport: 24372
facilitycode: 22
facilitylabel: local6
messagetype: firewall_action
priority: 180
protocol: 6
senderhost: 172.20.1.1
sensitivity: normal
serverport: 9092
severitycode: 4
severitylabel: warning
sourceinfo: unknown
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
vendorcode: ASA-4-106023
streamName: cisco_asa
clientIP: 248.37.153.197
serverIP: 48.1.169.140
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 31768,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48692,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "192.74.8.229",
"serverIP": "160.88.231.227"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:192.74.8.229/48692 dst dmz-1:160.88.231.227/31768 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 31768
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48692
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 192.74.8.229
serverIP: 160.88.231.227
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 31768,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48692,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "177.42.190.184",
"serverIP": "223.202.161.97"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:16: %ASA-4-106023: Deny tcp src outside:177.42.190.184/48692 dst dmz-1:223.202.161.97/31768 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 31768
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48692
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 177.42.190.184
serverIP: 223.202.161.97
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59211,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "71.211.238.160",
"serverIP": "212.133.219.114"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:71.211.238.160/59211 dst dmz-1:212.133.219.114/10001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59211
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 71.211.238.160
serverIP: 212.133.219.114
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 59211,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "104.164.216.80",
"serverIP": "156.86.103.62"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:03: %ASA-4-106023: Deny tcp src outside:104.164.216.80/59211 dst dmz-1:156.86.103.62/10001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 59211
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 104.164.216.80
serverIP: 156.86.103.62
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43786,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "230.227.149.189",
"serverIP": "149.2.244.10"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:230.227.149.189/43786 dst dmz-1:149.2.244.10/27001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43786
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 230.227.149.189
serverIP: 149.2.244.10
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 27001,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43786,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.227.43.79",
"serverIP": "79.255.236.20"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:06: %ASA-4-106023: Deny tcp src outside:150.227.43.79/43786 dst dmz-1:79.255.236.20/27001 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 27001
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43786
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 150.227.43.79
serverIP: 79.255.236.20
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2546,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "76.252.139.150",
"serverIP": "141.142.90.10"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:76.252.139.150/61953 dst dmz-1:141.142.90.10/2546 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2546
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 76.252.139.150
serverIP: 141.142.90.10
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2546,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.77.113.224",
"serverIP": "148.119.213.14"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:226.77.113.224/61953 dst dmz-1:148.119.213.14/2546 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2546
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.77.113.224
serverIP: 148.119.213.14
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2546,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "118.149.71.127",
"serverIP": "52.201.233.53"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:118.149.71.127/61953 dst dmz-1:52.201.233.53/2546 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2546
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 118.149.71.127
serverIP: 52.201.233.53
|
Explain this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2546,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61953,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.23.196.196",
"serverIP": "113.234.243.40"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:36:43: %ASA-4-106023: Deny tcp src outside:2.23.196.196/61953 dst dmz-1:113.234.243.40/2546 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2546
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61953
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.23.196.196
serverIP: 113.234.243.40
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "154.218.91.21",
"serverIP": "41.51.12.87"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:154.218.91.21/31331 dst dmz-1:41.51.12.87/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 154.218.91.21
serverIP: 41.51.12.87
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "41.148.244.93",
"serverIP": "16.129.73.33"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:41.148.244.93/31331 dst dmz-1:16.129.73.33/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 41.148.244.93
serverIP: 16.129.73.33
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "179.249.183.133",
"serverIP": "0.174.58.104"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:179.249.183.133/31331 dst dmz-1:0.174.58.104/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 179.249.183.133
serverIP: 0.174.58.104
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "202.10.105.154",
"serverIP": "88.187.72.158"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:202.10.105.154/31331 dst dmz-1:88.187.72.158/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 202.10.105.154
serverIP: 88.187.72.158
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "182.134.12.240",
"serverIP": "212.229.32.46"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:182.134.12.240/56808 dst dmz-1:212.229.32.46/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 182.134.12.240
serverIP: 212.229.32.46
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.230.106.139",
"serverIP": "120.44.107.86"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:2.230.106.139/56808 dst dmz-1:120.44.107.86/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.230.106.139
serverIP: 120.44.107.86
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "216.252.190.205",
"serverIP": "182.35.19.207"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:216.252.190.205/56808 dst dmz-1:182.35.19.207/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 216.252.190.205
serverIP: 182.35.19.207
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "23.106.55.24",
"serverIP": "206.232.118.196"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:05: %ASA-4-106023: Deny tcp src outside:23.106.55.24/56808 dst dmz-1:206.232.118.196/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 23.106.55.24
serverIP: 206.232.118.196
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31749,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "233.216.122.63",
"serverIP": "160.132.1.2"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:233.216.122.63/31749 dst dmz-1:160.132.1.2/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31749
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 233.216.122.63
serverIP: 160.132.1.2
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31749,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "229.58.21.193",
"serverIP": "30.79.186.3"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:06: %ASA-4-106023: Deny tcp src outside:229.58.21.193/31749 dst dmz-1:30.79.186.3/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31749
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 229.58.21.193
serverIP: 30.79.186.3
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2255,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "139.109.188.215",
"serverIP": "1.132.114.106"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:139.109.188.215/32629 dst dmz-1:1.132.114.106/2255 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2255
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 139.109.188.215
serverIP: 1.132.114.106
|
Explain this syslog message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 2255,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 32629,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "12.105.187.48",
"serverIP": "210.82.46.40"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:35:44: %ASA-4-106023: Deny tcp src outside:12.105.187.48/32629 dst dmz-1:210.82.46.40/2255 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 2255
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 32629
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 12.105.187.48
serverIP: 210.82.46.40
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "240.55.255.124",
"serverIP": "186.124.233.144"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:240.55.255.124/31331 dst dmz-1:186.124.233.144/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 240.55.255.124
serverIP: 186.124.233.144
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 18080,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 31331,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "52.164.191.16",
"serverIP": "208.190.189.80"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:56: %ASA-4-106023: Deny tcp src outside:52.164.191.16/31331 dst dmz-1:208.190.189.80/18080 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 18080
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 31331
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 52.164.191.16
serverIP: 208.190.189.80
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "192.68.51.94",
"serverIP": "222.29.190.101"
}
|
Create a JSON artifact from the message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:192.68.51.94/56808 dst dmz-1:222.29.190.101/25565 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 25565
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56808
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 192.68.51.94
serverIP: 222.29.190.101
|
Explain this syslog message
|
<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 25565,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 21 2022 12:34:59: %ASA-4-106023: Deny tcp src outside:144.202.41.117/56808 dst dmz-1:89.174.132.53/25565 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56808,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "144.202.41.117",
"serverIP": "89.174.132.53"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.