input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28366, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "144.160.19.50", "serverIP": "14.81.1.245" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:144.160.19.50/28366 dst dmz-1:14.81.1.245/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28366 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 144.160.19.50 serverIP: 14.81.1.245
Explain this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28366, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "55.245.252.179", "serverIP": "177.27.108.117" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:55.245.252.179/28366 dst dmz-1:177.27.108.117/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28366 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 55.245.252.179 serverIP: 177.27.108.117
Explain this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 445, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 28366, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "23.100.149.203", "serverIP": "207.124.157.19" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:50: %ASA-4-106023: Deny tcp src outside:23.100.149.203/28366 dst dmz-1:207.124.157.19/445 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 445 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 28366 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 23.100.149.203 serverIP: 207.124.157.19
Explain this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3101, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 33794, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "71.133.222.38", "serverIP": "156.102.128.53" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:71.133.222.38/33794 dst dmz-1:156.102.128.53/3101 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3101 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 33794 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 71.133.222.38 serverIP: 156.102.128.53
Explain this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3101, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 33794, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "205.200.49.217", "serverIP": "235.67.225.20" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:205.200.49.217/33794 dst dmz-1:235.67.225.20/3101 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3101 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 33794 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 205.200.49.217 serverIP: 235.67.225.20
Explain this syslog message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 34008, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "87.144.180.100", "serverIP": "239.133.238.196" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:87.144.180.100/34008 dst dmz-1:239.133.238.196/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 34008 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 87.144.180.100 serverIP: 239.133.238.196
Explain this syslog message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 34008, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "146.179.53.193", "serverIP": "185.110.237.204" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:22: %ASA-4-106023: Deny tcp src outside:146.179.53.193/34008 dst dmz-1:185.110.237.204/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 34008 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 146.179.53.193 serverIP: 185.110.237.204
Explain this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3101, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 33794, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "69.208.2.114", "serverIP": "238.160.94.229" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:69.208.2.114/33794 dst dmz-1:238.160.94.229/3101 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3101 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 33794 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 69.208.2.114 serverIP: 238.160.94.229
Explain this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3101, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 33794, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "149.195.247.230", "serverIP": "162.212.80.229" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:42: %ASA-4-106023: Deny tcp src outside:149.195.247.230/33794 dst dmz-1:162.212.80.229/3101 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3101 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 33794 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 149.195.247.230 serverIP: 162.212.80.229
Explain this syslog message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.233.147.169", "serverIP": "36.102.252.40" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:119.233.147.169/36690 dst dmz-1:36.102.252.40/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 119.233.147.169 serverIP: 36.102.252.40
Explain this syslog message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "18.42.8.67", "serverIP": "58.58.5.137" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:44: %ASA-4-106023: Deny tcp src outside:18.42.8.67/36690 dst dmz-1:58.58.5.137/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 18.42.8.67 serverIP: 58.58.5.137
Explain this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15056, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "23.198.168.111", "serverIP": "161.125.221.235" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:23.198.168.111/15056 dst dmz-1:161.125.221.235/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15056 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 23.198.168.111 serverIP: 161.125.221.235
Explain this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15056, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "182.109.88.51", "serverIP": "85.248.89.203" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:182.109.88.51/15056 dst dmz-1:85.248.89.203/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15056 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 182.109.88.51 serverIP: 85.248.89.203
Explain this syslog message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "25.119.206.29", "serverIP": "250.80.219.4" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:25.119.206.29/36690 dst dmz-1:250.80.219.4/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 25.119.206.29 serverIP: 250.80.219.4
Explain this syslog message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 80, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 36690, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "221.186.106.178", "serverIP": "214.184.141.224" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:32: %ASA-4-106023: Deny tcp src outside:221.186.106.178/36690 dst dmz-1:214.184.141.224/80 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 80 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 36690 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 221.186.106.178 serverIP: 214.184.141.224
Explain this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15056, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "167.62.76.33", "serverIP": "33.208.2.75" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:167.62.76.33/15056 dst dmz-1:33.208.2.75/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15056 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 167.62.76.33 serverIP: 33.208.2.75
Explain this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 15056, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "144.36.120.55", "serverIP": "103.173.44.35" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:39: %ASA-4-106023: Deny tcp src outside:144.36.120.55/15056 dst dmz-1:103.173.44.35/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 15056 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 144.36.120.55 serverIP: 103.173.44.35
Explain this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7786, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57335, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "131.177.3.212", "serverIP": "156.2.191.105" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:131.177.3.212/57335 dst dmz-1:156.2.191.105/7786 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7786 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57335 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 131.177.3.212 serverIP: 156.2.191.105
Explain this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7786, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57335, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "129.235.155.242", "serverIP": "253.38.245.187" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:129.235.155.242/57335 dst dmz-1:253.38.245.187/7786 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7786 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57335 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 129.235.155.242 serverIP: 253.38.245.187
Explain this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7786, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57335, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "50.166.69.61", "serverIP": "26.57.42.41" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:50.166.69.61/57335 dst dmz-1:26.57.42.41/7786 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7786 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57335 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 50.166.69.61 serverIP: 26.57.42.41
Explain this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 7786, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 57335, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "23.90.13.80", "serverIP": "212.229.5.127" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:54: %ASA-4-106023: Deny tcp src outside:23.90.13.80/57335 dst dmz-1:212.229.5.127/7786 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 7786 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 57335 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 23.90.13.80 serverIP: 212.229.5.127
Explain this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12329, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "79.79.101.82", "serverIP": "151.27.234.163" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:79.79.101.82/12329 dst dmz-1:151.27.234.163/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12329 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 79.79.101.82 serverIP: 151.27.234.163
Explain this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12329, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "8.149.63.129", "serverIP": "106.89.210.158" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:8.149.63.129/12329 dst dmz-1:106.89.210.158/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12329 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 8.149.63.129 serverIP: 106.89.210.158
Explain this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12329, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "125.138.125.83", "serverIP": "99.166.115.13" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:125.138.125.83/12329 dst dmz-1:99.166.115.13/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12329 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 125.138.125.83 serverIP: 99.166.115.13
Explain this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 12329, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "221.19.60.102", "serverIP": "48.196.105.80" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:51:52: %ASA-4-106023: Deny tcp src outside:221.19.60.102/12329 dst dmz-1:48.196.105.80/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 12329 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 221.19.60.102 serverIP: 48.196.105.80
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "72.31.146.136", "serverIP": "171.166.100.181" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:72.31.146.136/9090 dst dmz-1:171.166.100.181/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 72.31.146.136 serverIP: 171.166.100.181
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "26.49.19.16", "serverIP": "126.65.253.117" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:26.49.19.16/9090 dst dmz-1:126.65.253.117/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 26.49.19.16 serverIP: 126.65.253.117
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "115.172.61.127", "serverIP": "100.23.229.30" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:115.172.61.127/9090 dst dmz-1:100.23.229.30/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 115.172.61.127 serverIP: 100.23.229.30
Explain this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "112.101.113.98", "serverIP": "109.104.230.132" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:37: %ASA-4-106023: Deny tcp src outside:112.101.113.98/9090 dst dmz-1:109.104.230.132/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 112.101.113.98 serverIP: 109.104.230.132
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.85.34.46", "serverIP": "79.101.94.26" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:20.85.34.46/9090 dst dmz-1:79.101.94.26/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.85.34.46 serverIP: 79.101.94.26
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "62.53.186.113", "serverIP": "161.217.194.192" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:62.53.186.113/9090 dst dmz-1:161.217.194.192/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 62.53.186.113 serverIP: 161.217.194.192
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "161.20.245.57", "serverIP": "110.102.128.158" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:161.20.245.57/9090 dst dmz-1:110.102.128.158/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 161.20.245.57 serverIP: 110.102.128.158
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "82.199.141.62", "serverIP": "18.236.22.104" }
Create a JSON artifact from the message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:82.199.141.62/9090 dst dmz-1:18.236.22.104/22 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 22 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 9090 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 82.199.141.62 serverIP: 18.236.22.104
Explain this syslog message
<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 22, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 26 2022 08:52:15: %ASA-4-106023: Deny tcp src outside:33.237.189.48/9090 dst dmz-1:120.156.197.70/22 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 9090, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "33.237.189.48", "serverIP": "120.156.197.70" }
Create a JSON artifact from the message