input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 0.33.18.22
serverIP: 170.217.223.242 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "86.168.64.136",
"serverIP": "15.126.225.152"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 86.168.64.136
serverIP: 15.126.225.152 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "97.36.74.207",
"serverIP": "38.193.212.188"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 97.36.74.207
serverIP: 38.193.212.188 | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group \"OUTSIDE_ACL\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local7",
"messagetype": "firewall_action",
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 23,
"streamName": "cisco_asa",
"clientIP": "16.223.196.122",
"serverIP": "25.207.206.155"
} | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local7
messagetype: firewall_action
vendorcode: ASA-4-106023
action: block
protocol: 1
facilitycode: 23
streamName: cisco_asa
clientIP: 16.223.196.122
serverIP: 25.207.206.155 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58677,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.23.144.109",
"serverIP": "227.152.162.123"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
streamName: meraki
clientIP: 105.23.144.109
serverIP: 227.152.162.123 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58677,
"protocol": 6,
"streamName": "meraki",
"clientIP": "226.98.15.31",
"serverIP": "4.52.115.36"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
streamName: meraki
clientIP: 226.98.15.31
serverIP: 4.52.115.36 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58677,
"protocol": 6,
"streamName": "meraki",
"clientIP": "164.103.207.252",
"serverIP": "0.40.225.123"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
streamName: meraki
clientIP: 164.103.207.252
serverIP: 0.40.225.123 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58677,
"protocol": 6,
"streamName": "meraki",
"clientIP": "42.62.146.165",
"serverIP": "67.158.20.160"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
streamName: meraki
clientIP: 42.62.146.165
serverIP: 67.158.20.160 | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44858,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "107.220.246.249",
"serverIP": "66.155.240.146"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44858
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 107.220.246.249
serverIP: 66.155.240.146 | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44858,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "13.225.139.242",
"serverIP": "165.236.132.176"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44858
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 13.225.139.242
serverIP: 165.236.132.176 | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44858,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "166.185.80.55",
"serverIP": "94.224.178.33"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44858
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 166.185.80.55
serverIP: 94.224.178.33 | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 44858,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "63.164.7.162",
"serverIP": "79.197.220.94"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 44858
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 63.164.7.162
serverIP: 79.197.220.94 | Explain this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7778,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54154,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "254.34.154.211",
"serverIP": "155.250.232.254"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7778
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54154
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 254.34.154.211
serverIP: 155.250.232.254 | Explain this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7778,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54154,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "112.219.117.89",
"serverIP": "86.62.66.132"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7778
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54154
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 112.219.117.89
serverIP: 86.62.66.132 | Explain this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60237,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "75.32.77.168",
"serverIP": "194.215.229.23"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60237
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 75.32.77.168
serverIP: 194.215.229.23 | Explain this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 60237,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "26.66.23.28",
"serverIP": "221.99.222.130"
} | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 60237
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 26.66.23.28
serverIP: 221.99.222.130 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "17.212.235.179",
"serverIP": "58.216.0.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
streamName: meraki
clientIP: 17.212.235.179
serverIP: 58.216.0.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "51.64.255.207",
"serverIP": "20.149.137.179"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
streamName: meraki
clientIP: 51.64.255.207
serverIP: 20.149.137.179 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6376,
"protocol": 6,
"streamName": "meraki",
"clientIP": "118.64.2.183",
"serverIP": "182.159.146.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6376
protocol: 6
streamName: meraki
clientIP: 118.64.2.183
serverIP: 182.159.146.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6376,
"protocol": 6,
"streamName": "meraki",
"clientIP": "77.214.154.170",
"serverIP": "11.136.102.161"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6376
protocol: 6
streamName: meraki
clientIP: 77.214.154.170
serverIP: 11.136.102.161 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52385,
"protocol": 6,
"streamName": "meraki",
"clientIP": "170.47.134.168",
"serverIP": "5.9.92.229"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52385
protocol: 6
streamName: meraki
clientIP: 170.47.134.168
serverIP: 5.9.92.229 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52385,
"protocol": 6,
"streamName": "meraki",
"clientIP": "218.63.61.133",
"serverIP": "163.191.7.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52385
protocol: 6
streamName: meraki
clientIP: 218.63.61.133
serverIP: 163.191.7.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6092,
"protocol": 6,
"streamName": "meraki",
"clientIP": "115.64.220.224",
"serverIP": "35.107.60.23"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6092
protocol: 6
streamName: meraki
clientIP: 115.64.220.224
serverIP: 35.107.60.23 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6092,
"protocol": 6,
"streamName": "meraki",
"clientIP": "139.94.70.72",
"serverIP": "18.63.228.190"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6092
protocol: 6
streamName: meraki
clientIP: 139.94.70.72
serverIP: 18.63.228.190 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.166.120.55",
"serverIP": "22.10.54.83"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
streamName: meraki
clientIP: 212.166.120.55
serverIP: 22.10.54.83 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65504,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.116.75.155",
"serverIP": "240.132.126.228"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
streamName: meraki
clientIP: 158.116.75.155
serverIP: 240.132.126.228 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50272,
"protocol": 6,
"streamName": "meraki",
"clientIP": "181.127.165.51",
"serverIP": "235.7.183.24"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
streamName: meraki
clientIP: 181.127.165.51
serverIP: 235.7.183.24 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50272,
"protocol": 6,
"streamName": "meraki",
"clientIP": "18.254.172.253",
"serverIP": "135.4.109.27"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
streamName: meraki
clientIP: 18.254.172.253
serverIP: 135.4.109.27 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50272,
"protocol": 6,
"streamName": "meraki",
"clientIP": "111.116.133.213",
"serverIP": "2.222.158.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
streamName: meraki
clientIP: 111.116.133.213
serverIP: 2.222.158.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50272,
"protocol": 6,
"streamName": "meraki",
"clientIP": "243.19.168.27",
"serverIP": "65.14.62.235"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
streamName: meraki
clientIP: 243.19.168.27
serverIP: 65.14.62.235 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38177,
"protocol": 6,
"streamName": "meraki",
"clientIP": "85.42.234.41",
"serverIP": "246.1.78.212"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38177
protocol: 6
streamName: meraki
clientIP: 85.42.234.41
serverIP: 246.1.78.212 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38177,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.124.239.91",
"serverIP": "10.27.139.72"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38177
protocol: 6
streamName: meraki
clientIP: 58.124.239.91
serverIP: 10.27.139.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "103.154.178.101",
"serverIP": "75.179.16.16"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
streamName: meraki
clientIP: 103.154.178.101
serverIP: 75.179.16.16 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46688,
"protocol": 6,
"streamName": "meraki",
"clientIP": "47.194.162.97",
"serverIP": "173.196.104.213"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
streamName: meraki
clientIP: 47.194.162.97
serverIP: 173.196.104.213 | Explain this syslog message |