input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35932
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62527
protocol: 6
streamName: meraki
clientIP: 135.154.1.152
serverIP: 42.42.55.55
|
Explain this syslog message
|
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 35932,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62527,
"protocol": 6,
"streamName": "meraki",
"clientIP": "243.25.227.44",
"serverIP": "60.55.208.126"
}
|
Create a JSON artifact from the message
|
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=243.25.227.44 1 1670068018.296439454 M86_MX67C_Anniston flows src=60.55.208.126 dst=243.25.227.44 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35932
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62527
protocol: 6
streamName: meraki
clientIP: 243.25.227.44
serverIP: 60.55.208.126
|
Explain this syslog message
|
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 35932,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62527,
"protocol": 6,
"streamName": "meraki",
"clientIP": "119.28.14.189",
"serverIP": "180.109.130.66"
}
|
Create a JSON artifact from the message
|
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=119.28.14.189 1 1670068018.296439454 M86_MX67C_Anniston flows src=180.109.130.66 dst=119.28.14.189 protocol=tcp sport=35932 dport=62527 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35932
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62527
protocol: 6
streamName: meraki
clientIP: 119.28.14.189
serverIP: 180.109.130.66
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8689,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52145,
"protocol": 6,
"streamName": "meraki",
"clientIP": "7.71.227.108",
"serverIP": "90.148.39.70"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=7.71.227.108 dst=90.148.39.70 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8689
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52145
protocol: 6
streamName: meraki
clientIP: 7.71.227.108
serverIP: 90.148.39.70
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8689,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52145,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.104.72.96",
"serverIP": "128.186.166.92"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=58.104.72.96 dst=128.186.166.92 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8689
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52145
protocol: 6
streamName: meraki
clientIP: 58.104.72.96
serverIP: 128.186.166.92
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8689,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52145,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.123.205.49",
"serverIP": "29.69.200.113"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=248.123.205.49 dst=29.69.200.113 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8689
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52145
protocol: 6
streamName: meraki
clientIP: 248.123.205.49
serverIP: 29.69.200.113
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8689,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52145,
"protocol": 6,
"streamName": "meraki",
"clientIP": "237.44.183.23",
"serverIP": "76.52.72.28"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1670188930.299871709 NORDC_MX400_1 flows src=237.44.183.23 dst=76.52.72.28 protocol=tcp sport=52145 dport=8689 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8689
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52145
protocol: 6
streamName: meraki
clientIP: 237.44.183.23
serverIP: 76.52.72.28
|
Explain this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3489,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.30.48.221",
"serverIP": "65.33.250.5"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=240.30.48.221 dst=65.33.250.5 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3489
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46651
protocol: 6
streamName: meraki
clientIP: 240.30.48.221
serverIP: 65.33.250.5
|
Explain this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3489,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "157.208.120.34",
"serverIP": "217.194.130.66"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=157.208.120.34 dst=217.194.130.66 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3489
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46651
protocol: 6
streamName: meraki
clientIP: 157.208.120.34
serverIP: 217.194.130.66
|
Explain this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3489,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "237.191.159.92",
"serverIP": "99.238.140.80"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=237.191.159.92 dst=99.238.140.80 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3489
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46651
protocol: 6
streamName: meraki
clientIP: 237.191.159.92
serverIP: 99.238.140.80
|
Explain this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3489,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "150.99.115.171",
"serverIP": "244.170.174.252"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.132.210 1 1670032027.796576797 M28_MX67C_Lawrencville flows src=150.99.115.171 dst=244.170.174.252 protocol=tcp sport=46651 dport=3489 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3489
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46651
protocol: 6
streamName: meraki
clientIP: 150.99.115.171
serverIP: 244.170.174.252
|
Explain this syslog message
|
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5444,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60000,
"protocol": 6,
"streamName": "meraki",
"clientIP": "184.213.166.204",
"serverIP": "4.34.66.104"
}
|
Create a JSON artifact from the message
|
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=4.34.66.104 1 1670188929.183282661 M24_MX67C_ForestPark flows src=184.213.166.204 dst=4.34.66.104 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5444
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60000
protocol: 6
streamName: meraki
clientIP: 184.213.166.204
serverIP: 4.34.66.104
|
Explain this syslog message
|
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5444,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60000,
"protocol": 6,
"streamName": "meraki",
"clientIP": "152.235.37.110",
"serverIP": "201.179.211.144"
}
|
Create a JSON artifact from the message
|
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=201.179.211.144 1 1670188929.183282661 M24_MX67C_ForestPark flows src=152.235.37.110 dst=201.179.211.144 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5444
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60000
protocol: 6
streamName: meraki
clientIP: 152.235.37.110
serverIP: 201.179.211.144
|
Explain this syslog message
|
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5444,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60000,
"protocol": 6,
"streamName": "meraki",
"clientIP": "71.139.204.202",
"serverIP": "174.57.169.198"
}
|
Create a JSON artifact from the message
|
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=174.57.169.198 1 1670188929.183282661 M24_MX67C_ForestPark flows src=71.139.204.202 dst=174.57.169.198 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5444
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60000
protocol: 6
streamName: meraki
clientIP: 71.139.204.202
serverIP: 174.57.169.198
|
Explain this syslog message
|
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5444,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60000,
"protocol": 6,
"streamName": "meraki",
"clientIP": "233.159.211.162",
"serverIP": "83.7.182.113"
}
|
Create a JSON artifact from the message
|
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=83.7.182.113 1 1670188929.183282661 M24_MX67C_ForestPark flows src=233.159.211.162 dst=83.7.182.113 protocol=tcp sport=60000 dport=5444 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5444
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60000
protocol: 6
streamName: meraki
clientIP: 233.159.211.162
serverIP: 83.7.182.113
|
Explain this syslog message
|
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 9260,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "3.31.108.11",
"serverIP": "37.107.88.27"
}
|
Create a JSON artifact from the message
|
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=37.107.88.27 1 1670065643.121405297 M24_MX67C_ForestPark flows src=3.31.108.11 dst=37.107.88.27 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9260
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43329
protocol: 6
streamName: meraki
clientIP: 3.31.108.11
serverIP: 37.107.88.27
|
Explain this syslog message
|
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 9260,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.67.100.47",
"serverIP": "46.55.132.13"
}
|
Create a JSON artifact from the message
|
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=46.55.132.13 1 1670065643.121405297 M24_MX67C_ForestPark flows src=12.67.100.47 dst=46.55.132.13 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9260
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43329
protocol: 6
streamName: meraki
clientIP: 12.67.100.47
serverIP: 46.55.132.13
|
Explain this syslog message
|
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 9260,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "31.14.35.115",
"serverIP": "182.13.136.36"
}
|
Create a JSON artifact from the message
|
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=182.13.136.36 1 1670065643.121405297 M24_MX67C_ForestPark flows src=31.14.35.115 dst=182.13.136.36 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9260
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43329
protocol: 6
streamName: meraki
clientIP: 31.14.35.115
serverIP: 182.13.136.36
|
Explain this syslog message
|
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 9260,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.239.22.113",
"serverIP": "216.132.166.1"
}
|
Create a JSON artifact from the message
|
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=216.132.166.1 1 1670065643.121405297 M24_MX67C_ForestPark flows src=172.239.22.113 dst=216.132.166.1 protocol=tcp sport=43329 dport=9260 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9260
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43329
protocol: 6
streamName: meraki
clientIP: 172.239.22.113
serverIP: 216.132.166.1
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "11.33.197.214",
"serverIP": "144.115.114.40"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=11.33.197.214 dst=144.115.114.40 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 11.33.197.214
serverIP: 144.115.114.40
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "142.69.160.84",
"serverIP": "167.184.31.16"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=142.69.160.84 dst=167.184.31.16 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 142.69.160.84
serverIP: 167.184.31.16
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "180.208.173.163",
"serverIP": "200.193.4.181"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=180.208.173.163 dst=200.193.4.181 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 180.208.173.163
serverIP: 200.193.4.181
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "109.52.47.152",
"serverIP": "149.222.80.82"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=109.52.47.152 dst=149.222.80.82 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 109.52.47.152
serverIP: 149.222.80.82
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "127.106.56.235",
"serverIP": "125.189.118.240"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=127.106.56.235 dst=125.189.118.240 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 127.106.56.235
serverIP: 125.189.118.240
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "32.250.51.164",
"serverIP": "250.20.197.158"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670188937.941471436 M34_MX67C_Atlanta flows src=32.250.51.164 dst=250.20.197.158 protocol=udp sport=5375 dport=5070 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 32.250.51.164
serverIP: 250.20.197.158
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62364,
"protocol": 6,
"streamName": "meraki",
"clientIP": "88.51.251.17",
"serverIP": "235.196.116.82"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=88.51.251.17 dst=235.196.116.82 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62364
protocol: 6
streamName: meraki
clientIP: 88.51.251.17
serverIP: 235.196.116.82
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62364,
"protocol": 6,
"streamName": "meraki",
"clientIP": "124.246.106.221",
"serverIP": "244.109.250.119"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=124.246.106.221 dst=244.109.250.119 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62364
protocol: 6
streamName: meraki
clientIP: 124.246.106.221
serverIP: 244.109.250.119
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62364,
"protocol": 6,
"streamName": "meraki",
"clientIP": "110.43.221.83",
"serverIP": "177.105.58.184"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=110.43.221.83 dst=177.105.58.184 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62364
protocol: 6
streamName: meraki
clientIP: 110.43.221.83
serverIP: 177.105.58.184
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62364,
"protocol": 6,
"streamName": "meraki",
"clientIP": "81.151.15.1",
"serverIP": "5.86.255.13"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.350334548 M34_MX67C_Atlanta flows src=81.151.15.1 dst=5.86.255.13 protocol=tcp sport=62364 dport=3390 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62364
protocol: 6
streamName: meraki
clientIP: 81.151.15.1
serverIP: 5.86.255.13
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61888,
"protocol": 6,
"streamName": "meraki",
"clientIP": "21.162.30.83",
"serverIP": "40.217.88.79"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=21.162.30.83 dst=40.217.88.79 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61888
protocol: 6
streamName: meraki
clientIP: 21.162.30.83
serverIP: 40.217.88.79
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61888,
"protocol": 6,
"streamName": "meraki",
"clientIP": "79.59.122.71",
"serverIP": "96.138.9.126"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=79.59.122.71 dst=96.138.9.126 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61888
protocol: 6
streamName: meraki
clientIP: 79.59.122.71
serverIP: 96.138.9.126
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61888,
"protocol": 6,
"streamName": "meraki",
"clientIP": "203.65.161.186",
"serverIP": "83.43.199.191"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=203.65.161.186 dst=83.43.199.191 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61888
protocol: 6
streamName: meraki
clientIP: 203.65.161.186
serverIP: 83.43.199.191
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61888,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.93.243.190",
"serverIP": "241.217.184.148"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=96.73.199.109 1 1670186229.237435708 M34_MX67C_Atlanta flows src=248.93.243.190 dst=241.217.184.148 protocol=tcp sport=61888 dport=3389 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61888
protocol: 6
streamName: meraki
clientIP: 248.93.243.190
serverIP: 241.217.184.148
|
Explain this syslog message
|
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61641,
"protocol": 6,
"streamName": "meraki",
"clientIP": "217.205.142.96",
"serverIP": "148.224.5.240"
}
|
Create a JSON artifact from the message
|
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.