input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
|---|---|---|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28366,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "144.160.19.50",
"serverIP": "14.81.1.245"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28366
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 144.160.19.50
serverIP: 14.81.1.245
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28366,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "55.245.252.179",
"serverIP": "177.27.108.117"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28366
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 55.245.252.179
serverIP: 177.27.108.117
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 28366,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "23.100.149.203",
"serverIP": "207.124.157.19"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 28366
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 23.100.149.203
serverIP: 207.124.157.19
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3101,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 33794,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "71.133.222.38",
"serverIP": "156.102.128.53"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3101
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 33794
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 71.133.222.38
serverIP: 156.102.128.53
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3101,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 33794,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "205.200.49.217",
"serverIP": "235.67.225.20"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3101
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 33794
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 205.200.49.217
serverIP: 235.67.225.20
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 34008,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "87.144.180.100",
"serverIP": "239.133.238.196"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 34008
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 87.144.180.100
serverIP: 239.133.238.196
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 34008,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "146.179.53.193",
"serverIP": "185.110.237.204"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 34008
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 146.179.53.193
serverIP: 185.110.237.204
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3101,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 33794,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "69.208.2.114",
"serverIP": "238.160.94.229"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3101
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 33794
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 69.208.2.114
serverIP: 238.160.94.229
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3101,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 33794,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "149.195.247.230",
"serverIP": "162.212.80.229"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3101
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 33794
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 149.195.247.230
serverIP: 162.212.80.229
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "119.233.147.169",
"serverIP": "36.102.252.40"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 119.233.147.169
serverIP: 36.102.252.40
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "18.42.8.67",
"serverIP": "58.58.5.137"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 18.42.8.67
serverIP: 58.58.5.137
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15056,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "23.198.168.111",
"serverIP": "161.125.221.235"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15056
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 23.198.168.111
serverIP: 161.125.221.235
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15056,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "182.109.88.51",
"serverIP": "85.248.89.203"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15056
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 182.109.88.51
serverIP: 85.248.89.203
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "25.119.206.29",
"serverIP": "250.80.219.4"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 25.119.206.29
serverIP: 250.80.219.4
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 36690,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.186.106.178",
"serverIP": "214.184.141.224"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 36690
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.186.106.178
serverIP: 214.184.141.224
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15056,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "167.62.76.33",
"serverIP": "33.208.2.75"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15056
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 167.62.76.33
serverIP: 33.208.2.75
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 15056,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "144.36.120.55",
"serverIP": "103.173.44.35"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 15056
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 144.36.120.55
serverIP: 103.173.44.35
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7786,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57335,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "131.177.3.212",
"serverIP": "156.2.191.105"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7786
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57335
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 131.177.3.212
serverIP: 156.2.191.105
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7786,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57335,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "129.235.155.242",
"serverIP": "253.38.245.187"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7786
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57335
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 129.235.155.242
serverIP: 253.38.245.187
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7786,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57335,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "50.166.69.61",
"serverIP": "26.57.42.41"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7786
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57335
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 50.166.69.61
serverIP: 26.57.42.41
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7786,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 57335,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "23.90.13.80",
"serverIP": "212.229.5.127"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7786
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 57335
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 23.90.13.80
serverIP: 212.229.5.127
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12329,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "79.79.101.82",
"serverIP": "151.27.234.163"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12329
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 79.79.101.82
serverIP: 151.27.234.163
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12329,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "8.149.63.129",
"serverIP": "106.89.210.158"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12329
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 8.149.63.129
serverIP: 106.89.210.158
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12329,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "125.138.125.83",
"serverIP": "99.166.115.13"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12329
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 125.138.125.83
serverIP: 99.166.115.13
|
Explain this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12329,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "221.19.60.102",
"serverIP": "48.196.105.80"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12329
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 221.19.60.102
serverIP: 48.196.105.80
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "72.31.146.136",
"serverIP": "171.166.100.181"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 72.31.146.136
serverIP: 171.166.100.181
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "26.49.19.16",
"serverIP": "126.65.253.117"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 26.49.19.16
serverIP: 126.65.253.117
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "115.172.61.127",
"serverIP": "100.23.229.30"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 115.172.61.127
serverIP: 100.23.229.30
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "112.101.113.98",
"serverIP": "109.104.230.132"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 112.101.113.98
serverIP: 109.104.230.132
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.85.34.46",
"serverIP": "79.101.94.26"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.85.34.46
serverIP: 79.101.94.26
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "62.53.186.113",
"serverIP": "161.217.194.192"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 62.53.186.113
serverIP: 161.217.194.192
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "161.20.245.57",
"serverIP": "110.102.128.158"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 161.20.245.57
serverIP: 110.102.128.158
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "82.199.141.62",
"serverIP": "18.236.22.104"
}
|
Create a JSON artifact from the message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
|
Product: ASA Firewall
Vendor: Cisco
|
Identify this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
|
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 9090
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 82.199.141.62
serverIP: 18.236.22.104
|
Explain this syslog message
|
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
|
{
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 9090,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "33.237.189.48",
"serverIP": "120.156.197.70"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.