Hi,
This is an automatic action from the ASA device based upon the drops seen on the ASA device for any host.
The best possible workaround would be to use an exception on the ASA device:-
threat-detection scanning-threat [ shun
[ except { ip-address ip_address mask | object-group network_object_group_id } | duration seconds ]]
http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/T-Z/cmdref4/t1.html#pgfId-1563523
Thanks and Regards,
Vibhor Amrodia