input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3478,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3478
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3478,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3478
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43395,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43395
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43395,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43395
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61782
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61782
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33632
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.20... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33632
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6580
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.12... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6580
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.12... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 ds... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.20... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5856
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5856
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16001
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.22... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16001
protocol: 6
stream... | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"messag... | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unkno... | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"messag... | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unkno... | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"messag... | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unkno... | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"messag... | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unkno... | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "... | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo... | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "... | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo... | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "... | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo... | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "... | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo... | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknow... | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknow... | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknow... | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.