input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3478, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3478 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3478, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3478 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 3870, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 3870 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown ...
Explain this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43395, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown",...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43395 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown...
Explain this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 43395, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown",...
Create a JSON artifact from the message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 43395 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61782 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61782 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33632 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.20...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33632 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6580 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.12...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6580 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.12...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 ds...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13645 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.20...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5856 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5856 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 16001 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.22...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 16001 protocol: 6 stream...
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3...
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "messag...
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3...
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:3...
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unkno...
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "messag...
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unkno...
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:...
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "messag...
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:...
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:...
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unkno...
Explain this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
{ "rulename": "Geo Block Inbound", "senderhost": "10.99.10.30", "serverport": 23, "severitylabel": "informational", "tags": [ "rfc3164", "pan_firewall", "traffic_drop" ], "productids": [ 20 ], "severitycode": 6, "sourceinfo": "unknown", "messag...
Create a JSON artifact from the message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
Product: PAN NGFW Vendor: Palo Alto
Identify this syslog message
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:5...
This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message: rulename: Geo Block Inbound senderhost: 10.99.10.30 serverport: 23 severitylabel: informational tags: ['rfc3164', 'pan_firewall', 'traffic_drop'] productids: [20] severitycode: 6 sourceinfo: unkno...
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "...
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo...
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "...
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo...
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "...
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo...
Explain this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
{ "priority": 174, "senderhost": "10.52.255.10", "serverport": 3544, "severitylabel": "informational", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 6, "sourceinfo": "...
Create a JSON artifact from the message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 174 senderhost: 10.52.255.10 serverport: 3544 severitylabel: informational tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 6 sourceinfo...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.45.128.1 serverport: 443 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknow...
Explain this syslog message
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
{ "priority": 172, "senderhost": "10.45.128.1", "serverport": 443, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown"...
Create a JSON artifact from the message