input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 37443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56484, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "11.243.128.186", "serverIP": "2.19.0.192" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:11.243.128.186/56484 dst dmz-1:2.19.0.192/37443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 37443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56484 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 11.243.128.186 serverIP: 2.19.0.192
Explain this syslog message
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 37443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56484, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "69.51.122.114", "serverIP": "111.253.172.110" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:45:36: %ASA-4-106023: Deny tcp src outside:69.51.122.114/56484 dst dmz-1:111.253.172.110/37443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 37443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56484 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 69.51.122.114 serverIP: 111.253.172.110
Explain this syslog message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45074, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56781, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "141.74.165.0", "serverIP": "226.238.171.140" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:141.74.165.0/56781 dst dmz-1:226.238.171.140/45074 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45074 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56781 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 141.74.165.0 serverIP: 226.238.171.140
Explain this syslog message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45074, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 56781, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "13.72.43.61", "serverIP": "228.74.43.164" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:45:51: %ASA-4-106023: Deny tcp src outside:13.72.43.61/56781 dst dmz-1:228.74.43.164/45074 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45074 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 56781 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 13.72.43.61 serverIP: 228.74.43.164
Explain this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "123.137.42.119", "serverIP": "104.180.238.130" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:123.137.42.119/54527 dst dmz-1:104.180.238.130/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 123.137.42.119 serverIP: 104.180.238.130
Explain this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "84.72.218.101", "serverIP": "237.169.164.35" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:84.72.218.101/54527 dst dmz-1:237.169.164.35/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 84.72.218.101 serverIP: 237.169.164.35
Explain this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "251.195.211.165", "serverIP": "8.174.192.217" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:251.195.211.165/54527 dst dmz-1:8.174.192.217/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 251.195.211.165 serverIP: 8.174.192.217
Explain this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "150.232.232.229", "serverIP": "114.237.101.108" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:01: %ASA-4-106023: Deny tcp src outside:150.232.232.229/54527 dst dmz-1:114.237.101.108/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 150.232.232.229 serverIP: 114.237.101.108
Explain this syslog message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12193, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61088, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "155.222.0.85", "serverIP": "177.151.176.247" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:155.222.0.85/61088 dst dmz-1:177.151.176.247/12193 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12193 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61088 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 155.222.0.85 serverIP: 177.151.176.247
Explain this syslog message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 12193, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 61088, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "175.33.130.197", "serverIP": "9.5.15.11" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:04: %ASA-4-106023: Deny tcp src outside:175.33.130.197/61088 dst dmz-1:9.5.15.11/12193 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 12193 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 61088 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 175.33.130.197 serverIP: 9.5.15.11
Explain this syslog message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 26, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36089, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "228.22.162.7", "serverIP": "153.38.140.0" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:228.22.162.7/36089 dst dmz-1:153.38.140.0/26 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 26 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36089 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 228.22.162.7 serverIP: 153.38.140.0
Explain this syslog message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 26, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36089, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "99.13.138.214", "serverIP": "251.243.96.110" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:18:12: %ASA-4-106023: Deny tcp src outside:99.13.138.214/36089 dst dmz-1:251.243.96.110/26 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 26 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36089 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 99.13.138.214 serverIP: 251.243.96.110
Explain this syslog message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45005, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55707, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "67.111.98.127", "serverIP": "75.38.40.138" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:67.111.98.127/55707 dst dmz-1:75.38.40.138/45005 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45005 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55707 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 67.111.98.127 serverIP: 75.38.40.138
Explain this syslog message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 45005, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 55707, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "221.245.236.114", "serverIP": "120.192.89.141" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:27:04: %ASA-4-106023: Deny tcp src outside:221.245.236.114/55707 dst dmz-1:120.192.89.141/45005 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 45005 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 55707 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 221.245.236.114 serverIP: 120.192.89.141
Explain this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "110.248.98.232", "serverIP": "254.103.169.191" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:110.248.98.232/54527 dst dmz-1:254.103.169.191/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 110.248.98.232 serverIP: 254.103.169.191
Explain this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "116.127.210.79", "serverIP": "201.206.164.16" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:116.127.210.79/54527 dst dmz-1:201.206.164.16/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 116.127.210.79 serverIP: 201.206.164.16
Explain this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "19.199.130.102", "serverIP": "34.253.8.94" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:19.199.130.102/54527 dst dmz-1:34.253.8.94/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 19.199.130.102 serverIP: 34.253.8.94
Explain this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 54527, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "132.95.42.119", "serverIP": "211.28.145.225" }
Create a JSON artifact from the message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 06 2023 08:26:44: %ASA-4-106023: Deny tcp src outside:132.95.42.119/54527 dst dmz-1:211.28.145.225/36443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 54527 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 132.95.42.119 serverIP: 211.28.145.225
Explain this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32773, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.140.236.239", "serverIP": "206.110.6.72" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:119.140.236.239/42408 dst dmz-1:206.110.6.72/32773 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32773 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.140.236.239 serverIP: 206.110.6.72
Explain this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32773, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "41.125.49.229", "serverIP": "218.50.120.145" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:41.125.49.229/42408 dst dmz-1:218.50.120.145/32773 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32773 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 41.125.49.229 serverIP: 218.50.120.145
Explain this syslog message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43923, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "5.233.69.178", "serverIP": "194.115.19.101" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:5.233.69.178/43923 dst dmz-1:194.115.19.101/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43923 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 5.233.69.178 serverIP: 194.115.19.101
Explain this syslog message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3389, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 43923, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "236.37.10.144", "serverIP": "40.126.60.21" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:07:58: %ASA-4-106023: Deny tcp src outside:236.37.10.144/43923 dst dmz-1:40.126.60.21/3389 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3389 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 43923 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 236.37.10.144 serverIP: 40.126.60.21
Explain this syslog message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 30551, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48140, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "170.211.182.100", "serverIP": "152.196.113.44" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:170.211.182.100/48140 dst dmz-1:152.196.113.44/30551 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 30551 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48140 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 170.211.182.100 serverIP: 152.196.113.44
Explain this syslog message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 30551, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 48140, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "226.211.222.219", "serverIP": "97.95.140.124" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:01: %ASA-4-106023: Deny tcp src outside:226.211.222.219/48140 dst dmz-1:97.95.140.124/30551 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 30551 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 48140 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 226.211.222.219 serverIP: 97.95.140.124
Explain this syslog message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36781, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "65.86.41.12", "serverIP": "217.7.26.83" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:65.86.41.12/46347 dst dmz-1:217.7.26.83/36781 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36781 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 65.86.41.12 serverIP: 217.7.26.83
Explain this syslog message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 36781, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 46347, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "210.215.11.152", "serverIP": "11.168.65.205" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:13: %ASA-4-106023: Deny tcp src outside:210.215.11.152/46347 dst dmz-1:11.168.65.205/36781 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 36781 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 46347 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 210.215.11.152 serverIP: 11.168.65.205
Explain this syslog message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9304, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47340, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "88.134.72.146", "serverIP": "109.95.155.53" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:88.134.72.146/47340 dst dmz-1:109.95.155.53/9304 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9304 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47340 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 88.134.72.146 serverIP: 109.95.155.53
Explain this syslog message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 9304, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 47340, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "199.64.182.123", "serverIP": "175.171.189.169" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:08:46: %ASA-4-106023: Deny tcp src outside:199.64.182.123/47340 dst dmz-1:175.171.189.169/9304 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 9304 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 47340 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 199.64.182.123 serverIP: 175.171.189.169
Explain this syslog message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4145, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "61.47.239.91", "serverIP": "122.31.5.140" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:61.47.239.91/36045 dst dmz-1:122.31.5.140/4145 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4145 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 61.47.239.91 serverIP: 122.31.5.140
Explain this syslog message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 4145, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36045, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "65.160.228.210", "serverIP": "201.55.97.76" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:09:27: %ASA-4-106023: Deny tcp src outside:65.160.228.210/36045 dst dmz-1:201.55.97.76/4145 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 4145 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36045 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 65.160.228.210 serverIP: 201.55.97.76
Explain this syslog message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39534, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "79.193.2.60", "serverIP": "97.86.79.231" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:79.193.2.60/39534 dst dmz-1:97.86.79.231/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39534 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 79.193.2.60 serverIP: 97.86.79.231
Explain this syslog message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 8443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39534, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "83.243.28.246", "serverIP": "238.86.89.222" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:09:59: %ASA-4-106023: Deny tcp src outside:83.243.28.246/39534 dst dmz-1:238.86.89.222/8443 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 8443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39534 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 83.243.28.246 serverIP: 238.86.89.222
Explain this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32773, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "149.31.215.1", "serverIP": "183.160.168.93" }
Create a JSON artifact from the message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:149.31.215.1/42408 dst dmz-1:183.160.168.93/32773 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 32773 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 42408 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 149.31.215.1 serverIP: 183.160.168.93
Explain this syslog message
<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 32773, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Aug 28 2022 18:10:02: %ASA-4-106023: Deny tcp src outside:225.216.187.11/42408 dst dmz-1:55.203.140.178/32773 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 42408, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "225.216.187.11", "serverIP": "55.203.140.178" }
Create a JSON artifact from the message