witfoo/witq-1.0
Text2Text Generation
•
Updated
•
19
•
3
input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40666,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "200.252.144.55",
"serverIP": "177.123.185.94"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:200.252.144.55/40666 dst dmz-1:177.123.185.94/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40666
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 200.252.144.55
serverIP: 177.123.185.94 | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40666,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "176.248.189.245",
"serverIP": "52.59.46.193"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:176.248.189.245/40666 dst dmz-1:52.59.46.193/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40666
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 176.248.189.245
serverIP: 52.59.46.193 | Explain this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3478,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54622,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "252.245.129.15",
"serverIP": "207.130.83.24"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:252.245.129.15/54622 dst dmz-1:207.130.83.24/3478 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3478
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54622
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 252.245.129.15
serverIP: 207.130.83.24 | Explain this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3478,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 54622,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "57.186.181.7",
"serverIP": "227.0.57.135"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:10: %ASA-4-106023: Deny udp src outside:57.186.181.7/54622 dst dmz-1:227.0.57.135/3478 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3478
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 54622
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 57.186.181.7
serverIP: 227.0.57.135 | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40666,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "228.165.226.37",
"serverIP": "154.20.142.128"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:228.165.226.37/40666 dst dmz-1:154.20.142.128/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40666
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 228.165.226.37
serverIP: 154.20.142.128 | Explain this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3870,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 40666,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "127.70.122.244",
"serverIP": "250.189.197.71"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:21: %ASA-4-106023: Deny tcp src outside:127.70.122.244/40666 dst dmz-1:250.189.197.71/3870 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3870
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 40666
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 127.70.122.244
serverIP: 250.189.197.71 | Explain this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43395,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52143,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "160.129.44.68",
"serverIP": "220.203.181.57"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:220.203.181.57/43395 dst dmz-1:160.129.44.68/52143 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43395
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52143
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 160.129.44.68
serverIP: 220.203.181.57 | Explain this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 43395,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52143,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "171.5.38.74",
"serverIP": "66.103.243.133"
} | Create a JSON artifact from the message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 10 2023 03:28:29: %ASA-4-106023: Deny tcp src outside:66.103.243.133/43395 dst dmz-1:171.5.38.74/52143 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 43395
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52143
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 171.5.38.74
serverIP: 66.103.243.133 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13645,
"protocol": 6,
"streamName": "meraki",
"clientIP": "218.194.30.114",
"serverIP": "46.108.90.31"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=218.194.30.114 dst=46.108.90.31 protocol=tcp sport=13645 dport=25 pattern: 1 dst 46.108.90.31 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
streamName: meraki
clientIP: 218.194.30.114
serverIP: 46.108.90.31 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13645,
"protocol": 6,
"streamName": "meraki",
"clientIP": "130.93.23.60",
"serverIP": "50.223.52.13"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=130.93.23.60 dst=50.223.52.13 protocol=tcp sport=13645 dport=25 pattern: 1 dst 50.223.52.13 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
streamName: meraki
clientIP: 130.93.23.60
serverIP: 50.223.52.13 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61782,
"protocol": 6,
"streamName": "meraki",
"clientIP": "115.241.14.64",
"serverIP": "49.201.238.56"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=115.241.14.64 dst=49.201.238.56 protocol=tcp sport=61782 dport=80 pattern: 1 dst 49.201.238.56 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61782
protocol: 6
streamName: meraki
clientIP: 115.241.14.64
serverIP: 49.201.238.56 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61782,
"protocol": 6,
"streamName": "meraki",
"clientIP": "157.62.166.0",
"serverIP": "250.8.90.121"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996327.935037221 NORDC_MX400_1 flows src=157.62.166.0 dst=250.8.90.121 protocol=tcp sport=61782 dport=80 pattern: 1 dst 250.8.90.121 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61782
protocol: 6
streamName: meraki
clientIP: 157.62.166.0
serverIP: 250.8.90.121 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33632,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.62.145.28",
"serverIP": "183.83.11.119"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=56.62.145.28 dst=183.83.11.119 protocol=tcp sport=33632 dport=25 pattern: 1 dst 183.83.11.119 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33632
protocol: 6
streamName: meraki
clientIP: 56.62.145.28
serverIP: 183.83.11.119 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33632,
"protocol": 6,
"streamName": "meraki",
"clientIP": "183.126.136.202",
"serverIP": "229.148.133.202"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.152665571 NORDC_MX400_1 flows src=183.126.136.202 dst=229.148.133.202 protocol=tcp sport=33632 dport=25 pattern: 1 dst 229.148.133.202 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33632
protocol: 6
streamName: meraki
clientIP: 183.126.136.202
serverIP: 229.148.133.202 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6580,
"protocol": 6,
"streamName": "meraki",
"clientIP": "109.234.208.0",
"serverIP": "92.250.60.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=109.234.208.0 dst=92.250.60.106 protocol=tcp sport=6580 dport=25 pattern: 1 dst 92.250.60.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6580
protocol: 6
streamName: meraki
clientIP: 109.234.208.0
serverIP: 92.250.60.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6580,
"protocol": 6,
"streamName": "meraki",
"clientIP": "223.100.224.126",
"serverIP": "103.51.146.249"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.203282538 NORDC_MX400_1 flows src=223.100.224.126 dst=103.51.146.249 protocol=tcp sport=6580 dport=25 pattern: 1 dst 103.51.146.249 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6580
protocol: 6
streamName: meraki
clientIP: 223.100.224.126
serverIP: 103.51.146.249 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13645,
"protocol": 6,
"streamName": "meraki",
"clientIP": "128.127.165.125",
"serverIP": "187.232.181.32"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=128.127.165.125 dst=187.232.181.32 protocol=tcp sport=13645 dport=25 pattern: 1 dst 187.232.181.32 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
streamName: meraki
clientIP: 128.127.165.125
serverIP: 187.232.181.32 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13645,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.219.6.157",
"serverIP": "116.73.8.128"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.567132511 NORDC_MX400_1 flows src=6.219.6.157 dst=116.73.8.128 protocol=tcp sport=13645 dport=25 pattern: 1 dst 116.73.8.128 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13645
protocol: 6
streamName: meraki
clientIP: 6.219.6.157
serverIP: 116.73.8.128 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5856,
"protocol": 6,
"streamName": "meraki",
"clientIP": "107.162.230.205",
"serverIP": "215.39.244.121"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=107.162.230.205 dst=215.39.244.121 protocol=tcp sport=5856 dport=25 pattern: 1 dst 215.39.244.121 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5856
protocol: 6
streamName: meraki
clientIP: 107.162.230.205
serverIP: 215.39.244.121 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5856,
"protocol": 6,
"streamName": "meraki",
"clientIP": "230.185.152.9",
"serverIP": "145.188.172.132"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.738193573 NORDC_MX400_1 flows src=230.185.152.9 dst=145.188.172.132 protocol=tcp sport=5856 dport=25 pattern: 1 dst 145.188.172.132 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5856
protocol: 6
streamName: meraki
clientIP: 230.185.152.9
serverIP: 145.188.172.132 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16001,
"protocol": 6,
"streamName": "meraki",
"clientIP": "113.156.162.7",
"serverIP": "203.64.252.233"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=113.156.162.7 dst=203.64.252.233 protocol=tcp sport=16001 dport=25 pattern: 1 dst 203.64.252.233 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16001
protocol: 6
streamName: meraki
clientIP: 113.156.162.7
serverIP: 203.64.252.233 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16001,
"protocol": 6,
"streamName": "meraki",
"clientIP": "204.153.145.227",
"serverIP": "231.3.221.148"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655996328.386690033 NORDC_MX400_1 flows src=204.153.145.227 dst=231.3.221.148 protocol=tcp sport=16001 dport=25 pattern: 1 dst 231.3.221.148 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16001
protocol: 6
streamName: meraki
clientIP: 204.153.145.227
serverIP: 231.3.221.148 | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,",
"action": "block",
"localstarttime": "Apr 16 02:53:39",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 35890,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "14.227.3.36",
"serverIP": "32.166.204.37"
} | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.227.3.36,32.166.204.37,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 16 02:53:39
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 35890
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 14.227.3.36
serverIP: 32.166.204.37 | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,",
"action": "block",
"localstarttime": "Apr 16 02:53:39",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 35890,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "174.135.41.109",
"serverIP": "237.5.218.131"
} | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,174.135.41.109,237.5.218.131,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 16 02:53:39
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 35890
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 174.135.41.109
serverIP: 237.5.218.131 | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,",
"action": "block",
"localstarttime": "Apr 16 02:53:39",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 35890,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "157.17.253.91",
"serverIP": "223.160.123.114"
} | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,157.17.253.91,223.160.123.114,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:39,0,any,0,5016428754,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 16 02:53:39
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 35890
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 157.17.253.91
serverIP: 223.160.123.114 | Explain this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 23,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,,",
"action": "block",
"localstarttime": "Apr 16 02:53:39",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 35890,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "14.33.133.107",
"serverIP": "132.98.230.120"
} | Create a JSON artifact from the message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Apr 16 02:53:39 DC1-PA3220-1 1,2023/04/16 02:53:39,016201032964,TRAFFIC,drop,2560,2023/04/16 02:53:39,14.33.133.107,132.98.230.120,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/04/16 02:53:39,0,1,35890,23,0,0,0x0,tcp,deny,60,60,0,1,2023/04/16 02:53:40,0,any,0,5016428756,0x0,China,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-04-16T02:53:39.750-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 23
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Apr 16 02:53:39
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 35890
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 14.33.133.107
serverIP: 132.98.230.120 | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57367,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "215.137.188.170",
"serverIP": "121.44.54.105"
} | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.137.188.170(57367) -> inside/121.44.54.105(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57367
vendorcode: ASA-6-106100
action: block
protocol: 17
facilitycode: 21
streamName: cisco_asa
clientIP: 215.137.188.170
serverIP: 121.44.54.105 | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57367,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "30.143.211.147",
"serverIP": "17.48.19.215"
} | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/30.143.211.147(57367) -> inside/17.48.19.215(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57367
vendorcode: ASA-6-106100
action: block
protocol: 17
facilitycode: 21
streamName: cisco_asa
clientIP: 30.143.211.147
serverIP: 17.48.19.215 | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57367,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "215.13.22.79",
"serverIP": "199.62.156.176"
} | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/215.13.22.79(57367) -> inside/199.62.156.176(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57367
vendorcode: ASA-6-106100
action: block
protocol: 17
facilitycode: 21
streamName: cisco_asa
clientIP: 215.13.22.79
serverIP: 199.62.156.176 | Explain this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| {
"priority": 174,
"senderhost": "10.52.255.10",
"serverport": 3544,
"severitylabel": "informational",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 57367,
"vendorcode": "ASA-6-106100",
"action": "block",
"protocol": 17,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "94.161.144.165",
"serverIP": "81.79.229.136"
} | Create a JSON artifact from the message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<174>Feb 12 2023 06:03:31: %ASA-6-106100: access-list signallb denied udp signallb/94.161.144.165(57367) -> inside/81.79.229.136(3544) hit-cnt 5 300-second interval [0xcd895a67, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 174
senderhost: 10.52.255.10
serverport: 3544
severitylabel: informational
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 6
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 57367
vendorcode: ASA-6-106100
action: block
protocol: 17
facilitycode: 21
streamName: cisco_asa
clientIP: 94.161.144.165
serverIP: 81.79.229.136 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "158.130.59.231",
"serverIP": "141.15.208.219"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:158.130.59.231/56949 dst outside:141.15.208.219/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 158.130.59.231
serverIP: 141.15.208.219 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "87.129.127.5",
"serverIP": "99.50.35.172"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:87.129.127.5/56949 dst outside:99.50.35.172/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 87.129.127.5
serverIP: 99.50.35.172 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "238.170.57.132",
"serverIP": "121.74.231.28"
} | Create a JSON artifact from the message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:238.170.57.132/56949 dst outside:121.74.231.28/443 by access-group "inside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.45.128.1
serverport: 443
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 56949
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_asa
clientIP: 238.170.57.132
serverIP: 121.74.231.28 | Explain this syslog message |
<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group "inside_access_in" [0x0, 0x0]
| {
"priority": 172,
"senderhost": "10.45.128.1",
"serverport": 443,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 13 2023 02:31:56: %ASA-4-106023: Deny tcp src inside:129.103.152.219/56949 dst outside:10.187.22.130/443 by access-group \"inside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 56949,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_asa",
"clientIP": "129.103.152.219",
"serverIP": "10.187.22.130"
} | Create a JSON artifact from the message |
The dataset is constructed of 100k+ syslog messages from 150+ message families. Syslog sources include linux, windows, Cisco, Checkpoint, Palo Alto, and more than 100 other products. The purpose of the instruction dataset is to train models to translate the meaning of syslog messages to English.
The following instructions are used in the dataset:
Data was generated from 500,000,000+ WitFoo Precinct Artifacts. Data was sanitized and organized using the ArtiFish toolkit: https://ArtiFish.dev