input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "11.243.128.186",
"serverIP": "2.19.0.192"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 11.243.128.186
serverIP: 2.19.0.192
|
Explain this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 37443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56484,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "69.51.122.114",
"serverIP": "111.253.172.110"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 37443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56484
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 69.51.122.114
serverIP: 111.253.172.110
|
Explain this syslog message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45074,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56781,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "141.74.165.0",
"serverIP": "226.238.171.140"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45074
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56781
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 141.74.165.0
serverIP: 226.238.171.140
|
Explain this syslog message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45074,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 56781,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "13.72.43.61",
"serverIP": "228.74.43.164"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45074
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 56781
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 13.72.43.61
serverIP: 228.74.43.164
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "123.137.42.119",
"serverIP": "104.180.238.130"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 123.137.42.119
serverIP: 104.180.238.130
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "84.72.218.101",
"serverIP": "237.169.164.35"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 84.72.218.101
serverIP: 237.169.164.35
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "251.195.211.165",
"serverIP": "8.174.192.217"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 251.195.211.165
serverIP: 8.174.192.217
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "150.232.232.229",
"serverIP": "114.237.101.108"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 150.232.232.229
serverIP: 114.237.101.108
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12193,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61088,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "155.222.0.85",
"serverIP": "177.151.176.247"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12193
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61088
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 155.222.0.85
serverIP: 177.151.176.247
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12193,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 61088,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "175.33.130.197",
"serverIP": "9.5.15.11"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12193
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 61088
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 175.33.130.197
serverIP: 9.5.15.11
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 26,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36089,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.22.162.7",
"serverIP": "153.38.140.0"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 26
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36089
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.22.162.7
serverIP: 153.38.140.0
|
Explain this syslog message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 26,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36089,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "99.13.138.214",
"serverIP": "251.243.96.110"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 26
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36089
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 99.13.138.214
serverIP: 251.243.96.110
|
Explain this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45005,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55707,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "67.111.98.127",
"serverIP": "75.38.40.138"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45005
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55707
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 67.111.98.127
serverIP: 75.38.40.138
|
Explain this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 45005,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 55707,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.245.236.114",
"serverIP": "120.192.89.141"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 45005
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 55707
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.245.236.114
serverIP: 120.192.89.141
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "110.248.98.232",
"serverIP": "254.103.169.191"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 110.248.98.232
serverIP: 254.103.169.191
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "116.127.210.79",
"serverIP": "201.206.164.16"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 116.127.210.79
serverIP: 201.206.164.16
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "19.199.130.102",
"serverIP": "34.253.8.94"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 19.199.130.102
serverIP: 34.253.8.94
|
Explain this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54527,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "132.95.42.119",
"serverIP": "211.28.145.225"
}
|
Create a JSON artifact from the message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54527
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 132.95.42.119
serverIP: 211.28.145.225
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32773,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.140.236.239",
"serverIP": "206.110.6.72"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32773
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.140.236.239
serverIP: 206.110.6.72
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32773,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "41.125.49.229",
"serverIP": "218.50.120.145"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32773
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 41.125.49.229
serverIP: 218.50.120.145
|
Explain this syslog message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43923,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "5.233.69.178",
"serverIP": "194.115.19.101"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43923
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 5.233.69.178
serverIP: 194.115.19.101
|
Explain this syslog message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3389,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 43923,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "236.37.10.144",
"serverIP": "40.126.60.21"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3389
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 43923
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 236.37.10.144
serverIP: 40.126.60.21
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 30551,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48140,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "170.211.182.100",
"serverIP": "152.196.113.44"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 30551
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48140
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 170.211.182.100
serverIP: 152.196.113.44
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 30551,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 48140,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.211.222.219",
"serverIP": "97.95.140.124"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 30551
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 48140
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.211.222.219
serverIP: 97.95.140.124
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36781,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.86.41.12",
"serverIP": "217.7.26.83"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36781
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.86.41.12
serverIP: 217.7.26.83
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 36781,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 46347,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "210.215.11.152",
"serverIP": "11.168.65.205"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 36781
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 46347
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 210.215.11.152
serverIP: 11.168.65.205
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9304,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47340,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "88.134.72.146",
"serverIP": "109.95.155.53"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9304
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47340
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 88.134.72.146
serverIP: 109.95.155.53
|
Explain this syslog message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 9304,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47340,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "199.64.182.123",
"serverIP": "175.171.189.169"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 9304
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47340
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 199.64.182.123
serverIP: 175.171.189.169
|
Explain this syslog message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4145,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "61.47.239.91",
"serverIP": "122.31.5.140"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4145
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 61.47.239.91
serverIP: 122.31.5.140
|
Explain this syslog message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 4145,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36045,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.160.228.210",
"serverIP": "201.55.97.76"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 4145
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36045
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.160.228.210
serverIP: 201.55.97.76
|
Explain this syslog message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39534,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.193.2.60",
"serverIP": "97.86.79.231"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39534
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.193.2.60
serverIP: 97.86.79.231
|
Explain this syslog message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39534,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "83.243.28.246",
"serverIP": "238.86.89.222"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39534
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 83.243.28.246
serverIP: 238.86.89.222
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32773,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "149.31.215.1",
"serverIP": "183.160.168.93"
}
|
Create a JSON artifact from the message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 32773
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 42408
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 149.31.215.1
serverIP: 183.160.168.93
|
Explain this syslog message
|
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 32773,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 42408,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "225.216.187.11",
"serverIP": "55.203.140.178"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.