input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35932 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62527 protocol: 6 streamName: meraki clientIP: 135.154.1.152 serverIP: 42.42.55.55
Explain this syslog message
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35932, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62527, "protocol": 6, "streamName": "meraki", "clientIP": "243.25.227.44", "serverIP": "60.55.208.126" }
Create a JSON artifact from the message
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35932 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62527 protocol: 6 streamName: meraki clientIP: 243.25.227.44 serverIP: 60.55.208.126
Explain this syslog message
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35932, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62527, "protocol": 6, "streamName": "meraki", "clientIP": "119.28.14.189", "serverIP": "180.109.130.66" }
Create a JSON artifact from the message
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35932 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62527 protocol: 6 streamName: meraki clientIP: 119.28.14.189 serverIP: 180.109.130.66
Explain this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8689, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52145, "protocol": 6, "streamName": "meraki", "clientIP": "7.71.227.108", "serverIP": "90.148.39.70" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8689 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52145 protocol: 6 streamName: meraki clientIP: 7.71.227.108 serverIP: 90.148.39.70
Explain this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8689, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52145, "protocol": 6, "streamName": "meraki", "clientIP": "58.104.72.96", "serverIP": "128.186.166.92" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8689 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52145 protocol: 6 streamName: meraki clientIP: 58.104.72.96 serverIP: 128.186.166.92
Explain this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8689, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52145, "protocol": 6, "streamName": "meraki", "clientIP": "248.123.205.49", "serverIP": "29.69.200.113" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8689 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52145 protocol: 6 streamName: meraki clientIP: 248.123.205.49 serverIP: 29.69.200.113
Explain this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8689, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52145, "protocol": 6, "streamName": "meraki", "clientIP": "237.44.183.23", "serverIP": "76.52.72.28" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8689 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52145 protocol: 6 streamName: meraki clientIP: 237.44.183.23 serverIP: 76.52.72.28
Explain this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3489, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46651, "protocol": 6, "streamName": "meraki", "clientIP": "240.30.48.221", "serverIP": "65.33.250.5" }
Create a JSON artifact from the message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3489 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46651 protocol: 6 streamName: meraki clientIP: 240.30.48.221 serverIP: 65.33.250.5
Explain this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3489, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46651, "protocol": 6, "streamName": "meraki", "clientIP": "157.208.120.34", "serverIP": "217.194.130.66" }
Create a JSON artifact from the message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3489 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46651 protocol: 6 streamName: meraki clientIP: 157.208.120.34 serverIP: 217.194.130.66
Explain this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3489, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46651, "protocol": 6, "streamName": "meraki", "clientIP": "237.191.159.92", "serverIP": "99.238.140.80" }
Create a JSON artifact from the message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3489 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46651 protocol: 6 streamName: meraki clientIP: 237.191.159.92 serverIP: 99.238.140.80
Explain this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3489, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46651, "protocol": 6, "streamName": "meraki", "clientIP": "150.99.115.171", "serverIP": "244.170.174.252" }
Create a JSON artifact from the message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3489 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46651 protocol: 6 streamName: meraki clientIP: 150.99.115.171 serverIP: 244.170.174.252
Explain this syslog message
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5444, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60000, "protocol": 6, "streamName": "meraki", "clientIP": "184.213.166.204", "serverIP": "4.34.66.104" }
Create a JSON artifact from the message
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5444 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60000 protocol: 6 streamName: meraki clientIP: 184.213.166.204 serverIP: 4.34.66.104
Explain this syslog message
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5444, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60000, "protocol": 6, "streamName": "meraki", "clientIP": "152.235.37.110", "serverIP": "201.179.211.144" }
Create a JSON artifact from the message
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5444 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60000 protocol: 6 streamName: meraki clientIP: 152.235.37.110 serverIP: 201.179.211.144
Explain this syslog message
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5444, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60000, "protocol": 6, "streamName": "meraki", "clientIP": "71.139.204.202", "serverIP": "174.57.169.198" }
Create a JSON artifact from the message
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5444 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60000 protocol: 6 streamName: meraki clientIP: 71.139.204.202 serverIP: 174.57.169.198
Explain this syslog message
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5444, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60000, "protocol": 6, "streamName": "meraki", "clientIP": "233.159.211.162", "serverIP": "83.7.182.113" }
Create a JSON artifact from the message
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5444 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60000 protocol: 6 streamName: meraki clientIP: 233.159.211.162 serverIP: 83.7.182.113
Explain this syslog message
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9260, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43329, "protocol": 6, "streamName": "meraki", "clientIP": "3.31.108.11", "serverIP": "37.107.88.27" }
Create a JSON artifact from the message
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9260 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43329 protocol: 6 streamName: meraki clientIP: 3.31.108.11 serverIP: 37.107.88.27
Explain this syslog message
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9260, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43329, "protocol": 6, "streamName": "meraki", "clientIP": "12.67.100.47", "serverIP": "46.55.132.13" }
Create a JSON artifact from the message
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9260 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43329 protocol: 6 streamName: meraki clientIP: 12.67.100.47 serverIP: 46.55.132.13
Explain this syslog message
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9260, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43329, "protocol": 6, "streamName": "meraki", "clientIP": "31.14.35.115", "serverIP": "182.13.136.36" }
Create a JSON artifact from the message
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9260 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43329 protocol: 6 streamName: meraki clientIP: 31.14.35.115 serverIP: 182.13.136.36
Explain this syslog message
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9260, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43329, "protocol": 6, "streamName": "meraki", "clientIP": "172.239.22.113", "serverIP": "216.132.166.1" }
Create a JSON artifact from the message
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9260 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43329 protocol: 6 streamName: meraki clientIP: 172.239.22.113 serverIP: 216.132.166.1
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "11.33.197.214", "serverIP": "144.115.114.40" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 11.33.197.214 serverIP: 144.115.114.40
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "142.69.160.84", "serverIP": "167.184.31.16" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 142.69.160.84 serverIP: 167.184.31.16
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "180.208.173.163", "serverIP": "200.193.4.181" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 180.208.173.163 serverIP: 200.193.4.181
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "109.52.47.152", "serverIP": "149.222.80.82" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 109.52.47.152 serverIP: 149.222.80.82
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "127.106.56.235", "serverIP": "125.189.118.240" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 127.106.56.235 serverIP: 125.189.118.240
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5070, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5375, "protocol": 17, "streamName": "meraki", "clientIP": "32.250.51.164", "serverIP": "250.20.197.158" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5070 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5375 protocol: 17 streamName: meraki clientIP: 32.250.51.164 serverIP: 250.20.197.158
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3390, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62364, "protocol": 6, "streamName": "meraki", "clientIP": "88.51.251.17", "serverIP": "235.196.116.82" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3390 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62364 protocol: 6 streamName: meraki clientIP: 88.51.251.17 serverIP: 235.196.116.82
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3390, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62364, "protocol": 6, "streamName": "meraki", "clientIP": "124.246.106.221", "serverIP": "244.109.250.119" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3390 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62364 protocol: 6 streamName: meraki clientIP: 124.246.106.221 serverIP: 244.109.250.119
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3390, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62364, "protocol": 6, "streamName": "meraki", "clientIP": "110.43.221.83", "serverIP": "177.105.58.184" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3390 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62364 protocol: 6 streamName: meraki clientIP: 110.43.221.83 serverIP: 177.105.58.184
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3390, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62364, "protocol": 6, "streamName": "meraki", "clientIP": "81.151.15.1", "serverIP": "5.86.255.13" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3390 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62364 protocol: 6 streamName: meraki clientIP: 81.151.15.1 serverIP: 5.86.255.13
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61888, "protocol": 6, "streamName": "meraki", "clientIP": "21.162.30.83", "serverIP": "40.217.88.79" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61888 protocol: 6 streamName: meraki clientIP: 21.162.30.83 serverIP: 40.217.88.79
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61888, "protocol": 6, "streamName": "meraki", "clientIP": "79.59.122.71", "serverIP": "96.138.9.126" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61888 protocol: 6 streamName: meraki clientIP: 79.59.122.71 serverIP: 96.138.9.126
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61888, "protocol": 6, "streamName": "meraki", "clientIP": "203.65.161.186", "serverIP": "83.43.199.191" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61888 protocol: 6 streamName: meraki clientIP: 203.65.161.186 serverIP: 83.43.199.191
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61888, "protocol": 6, "streamName": "meraki", "clientIP": "248.93.243.190", "serverIP": "241.217.184.148" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3389 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61888 protocol: 6 streamName: meraki clientIP: 248.93.243.190 serverIP: 241.217.184.148
Explain this syslog message
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3389, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61641, "protocol": 6, "streamName": "meraki", "clientIP": "217.205.142.96", "serverIP": "148.224.5.240" }
Create a JSON artifact from the message
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message