input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:42: %ASA-4-106023: Deny tcp src outside:192.20.145.111/50409 dst dmz-1:61.179.114.216/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 50409 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 192.20.145.111 serverIP: 61.179.114.216
Explain this syslog message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:0.240.231.124/26151 dst dmz-1:54.194.99.213/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:0.240.231.124/26151 dst dmz-1:54.194.99.213/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "0.240.231.124", "serverIP": "54.194.99.213" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:0.240.231.124/26151 dst dmz-1:54.194.99.213/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:0.240.231.124/26151 dst dmz-1:54.194.99.213/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 0.240.231.124 serverIP: 54.194.99.213
Explain this syslog message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:233.178.188.82/26151 dst dmz-1:246.59.139.226/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:233.178.188.82/26151 dst dmz-1:246.59.139.226/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "233.178.188.82", "serverIP": "246.59.139.226" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:233.178.188.82/26151 dst dmz-1:246.59.139.226/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:55:46: %ASA-4-106023: Deny udp src outside:233.178.188.82/26151 dst dmz-1:246.59.139.226/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 233.178.188.82 serverIP: 246.59.139.226
Explain this syslog message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:235.247.9.191/26151 dst dmz-1:109.4.1.77/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:235.247.9.191/26151 dst dmz-1:109.4.1.77/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "235.247.9.191", "serverIP": "109.4.1.77" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:235.247.9.191/26151 dst dmz-1:109.4.1.77/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:235.247.9.191/26151 dst dmz-1:109.4.1.77/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 235.247.9.191 serverIP: 109.4.1.77
Explain this syslog message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:174.63.232.111/26151 dst dmz-1:6.15.132.54/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:174.63.232.111/26151 dst dmz-1:6.15.132.54/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "174.63.232.111", "serverIP": "6.15.132.54" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:174.63.232.111/26151 dst dmz-1:6.15.132.54/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:56:36: %ASA-4-106023: Deny udp src outside:174.63.232.111/26151 dst dmz-1:6.15.132.54/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 174.63.232.111 serverIP: 6.15.132.54
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:186.188.135.12/26151 dst dmz-1:11.125.140.203/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:186.188.135.12/26151 dst dmz-1:11.125.140.203/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "186.188.135.12", "serverIP": "11.125.140.203" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:186.188.135.12/26151 dst dmz-1:11.125.140.203/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:186.188.135.12/26151 dst dmz-1:11.125.140.203/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 186.188.135.12 serverIP: 11.125.140.203
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:49.243.164.24/26151 dst dmz-1:193.107.44.242/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:49.243.164.24/26151 dst dmz-1:193.107.44.242/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "49.243.164.24", "serverIP": "193.107.44.242" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:49.243.164.24/26151 dst dmz-1:193.107.44.242/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:49.243.164.24/26151 dst dmz-1:193.107.44.242/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 49.243.164.24 serverIP: 193.107.44.242
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:53.132.96.218/26151 dst dmz-1:190.225.73.63/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:53.132.96.218/26151 dst dmz-1:190.225.73.63/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "53.132.96.218", "serverIP": "190.225.73.63" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:53.132.96.218/26151 dst dmz-1:190.225.73.63/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:53.132.96.218/26151 dst dmz-1:190.225.73.63/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 53.132.96.218 serverIP: 190.225.73.63
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:119.111.97.59/26151 dst dmz-1:0.198.125.59/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:119.111.97.59/26151 dst dmz-1:0.198.125.59/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "119.111.97.59", "serverIP": "0.198.125.59" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:119.111.97.59/26151 dst dmz-1:0.198.125.59/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:119.111.97.59/26151 dst dmz-1:0.198.125.59/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 119.111.97.59 serverIP: 0.198.125.59
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:147.38.176.3/26151 dst dmz-1:27.19.108.101/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:147.38.176.3/26151 dst dmz-1:27.19.108.101/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "147.38.176.3", "serverIP": "27.19.108.101" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:147.38.176.3/26151 dst dmz-1:27.19.108.101/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:147.38.176.3/26151 dst dmz-1:27.19.108.101/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 147.38.176.3 serverIP: 27.19.108.101
Explain this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:197.155.55.211/26151 dst dmz-1:40.172.38.116/514 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 514, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:197.155.55.211/26151 dst dmz-1:40.172.38.116/514 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 26151, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "197.155.55.211", "serverIP": "40.172.38.116" }
Create a JSON artifact from the message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:197.155.55.211/26151 dst dmz-1:40.172.38.116/514 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 06 2022 23:57:12: %ASA-4-106023: Deny udp src outside:197.155.55.211/26151 dst dmz-1:40.172.38.116/514 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 514 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 26151 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 197.155.55.211 serverIP: 40.172.38.116
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=58.255.203.109 dst=143.249.228.18 protocol=tcp sport=22065 dport=25 pattern: 1 dst 143.249.228.18
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=58.255.203.109 dst=143.249.228.18 protocol=tcp sport=22065 dport=25 pattern: 1 dst 143.249.228.18", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22065, "protocol": 6, "streamName": "meraki", "clientIP": "58.255.203.109", "serverIP": "143.249.228.18" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=58.255.203.109 dst=143.249.228.18 protocol=tcp sport=22065 dport=25 pattern: 1 dst 143.249.228.18
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=58.255.203.109 dst=143.249.228.18 protocol=tcp sport=22065 dport=25 pattern: 1 dst 143.249.228.18
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22065 protocol: 6 streamName: meraki clientIP: 58.255.203.109 serverIP: 143.249.228.18
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=129.215.212.185 dst=222.98.189.64 protocol=tcp sport=22065 dport=25 pattern: 1 dst 222.98.189.64
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=129.215.212.185 dst=222.98.189.64 protocol=tcp sport=22065 dport=25 pattern: 1 dst 222.98.189.64", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22065, "protocol": 6, "streamName": "meraki", "clientIP": "129.215.212.185", "serverIP": "222.98.189.64" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=129.215.212.185 dst=222.98.189.64 protocol=tcp sport=22065 dport=25 pattern: 1 dst 222.98.189.64
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=129.215.212.185 dst=222.98.189.64 protocol=tcp sport=22065 dport=25 pattern: 1 dst 222.98.189.64
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22065 protocol: 6 streamName: meraki clientIP: 129.215.212.185 serverIP: 222.98.189.64
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=32.23.59.49 dst=170.157.11.26 protocol=tcp sport=60126 dport=80 pattern: 1 dst 170.157.11.26
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=32.23.59.49 dst=170.157.11.26 protocol=tcp sport=60126 dport=80 pattern: 1 dst 170.157.11.26", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60126, "protocol": 6, "streamName": "meraki", "clientIP": "32.23.59.49", "serverIP": "170.157.11.26" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=32.23.59.49 dst=170.157.11.26 protocol=tcp sport=60126 dport=80 pattern: 1 dst 170.157.11.26
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=32.23.59.49 dst=170.157.11.26 protocol=tcp sport=60126 dport=80 pattern: 1 dst 170.157.11.26
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60126 protocol: 6 streamName: meraki clientIP: 32.23.59.49 serverIP: 170.157.11.26
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=145.216.208.104 dst=35.70.196.123 protocol=tcp sport=60126 dport=80 pattern: 1 dst 35.70.196.123
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=145.216.208.104 dst=35.70.196.123 protocol=tcp sport=60126 dport=80 pattern: 1 dst 35.70.196.123", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60126, "protocol": 6, "streamName": "meraki", "clientIP": "145.216.208.104", "serverIP": "35.70.196.123" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=145.216.208.104 dst=35.70.196.123 protocol=tcp sport=60126 dport=80 pattern: 1 dst 35.70.196.123
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.523357970 NORDC_MX400_1 flows src=145.216.208.104 dst=35.70.196.123 protocol=tcp sport=60126 dport=80 pattern: 1 dst 35.70.196.123
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60126 protocol: 6 streamName: meraki clientIP: 145.216.208.104 serverIP: 35.70.196.123
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=106.252.185.81 dst=127.184.155.114 protocol=tcp sport=22065 dport=25 pattern: 1 dst 127.184.155.114
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=106.252.185.81 dst=127.184.155.114 protocol=tcp sport=22065 dport=25 pattern: 1 dst 127.184.155.114", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22065, "protocol": 6, "streamName": "meraki", "clientIP": "106.252.185.81", "serverIP": "127.184.155.114" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=106.252.185.81 dst=127.184.155.114 protocol=tcp sport=22065 dport=25 pattern: 1 dst 127.184.155.114
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=106.252.185.81 dst=127.184.155.114 protocol=tcp sport=22065 dport=25 pattern: 1 dst 127.184.155.114
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22065 protocol: 6 streamName: meraki clientIP: 106.252.185.81 serverIP: 127.184.155.114
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=42.4.146.185 dst=56.40.139.71 protocol=tcp sport=22065 dport=25 pattern: 1 dst 56.40.139.71
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=42.4.146.185 dst=56.40.139.71 protocol=tcp sport=22065 dport=25 pattern: 1 dst 56.40.139.71", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22065, "protocol": 6, "streamName": "meraki", "clientIP": "42.4.146.185", "serverIP": "56.40.139.71" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=42.4.146.185 dst=56.40.139.71 protocol=tcp sport=22065 dport=25 pattern: 1 dst 56.40.139.71
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.567104726 NORDC_MX400_1 flows src=42.4.146.185 dst=56.40.139.71 protocol=tcp sport=22065 dport=25 pattern: 1 dst 56.40.139.71
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22065 protocol: 6 streamName: meraki clientIP: 42.4.146.185 serverIP: 56.40.139.71
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=152.191.125.75 dst=21.21.14.33 protocol=tcp sport=13952 dport=25 pattern: 1 dst 21.21.14.33
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=152.191.125.75 dst=21.21.14.33 protocol=tcp sport=13952 dport=25 pattern: 1 dst 21.21.14.33", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13952, "protocol": 6, "streamName": "meraki", "clientIP": "152.191.125.75", "serverIP": "21.21.14.33" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=152.191.125.75 dst=21.21.14.33 protocol=tcp sport=13952 dport=25 pattern: 1 dst 21.21.14.33
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=152.191.125.75 dst=21.21.14.33 protocol=tcp sport=13952 dport=25 pattern: 1 dst 21.21.14.33
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13952 protocol: 6 streamName: meraki clientIP: 152.191.125.75 serverIP: 21.21.14.33
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=90.26.16.32 dst=149.241.26.241 protocol=tcp sport=13952 dport=25 pattern: 1 dst 149.241.26.241
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=90.26.16.32 dst=149.241.26.241 protocol=tcp sport=13952 dport=25 pattern: 1 dst 149.241.26.241", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13952, "protocol": 6, "streamName": "meraki", "clientIP": "90.26.16.32", "serverIP": "149.241.26.241" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=90.26.16.32 dst=149.241.26.241 protocol=tcp sport=13952 dport=25 pattern: 1 dst 149.241.26.241
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.379366251 NORDC_MX400_1 flows src=90.26.16.32 dst=149.241.26.241 protocol=tcp sport=13952 dport=25 pattern: 1 dst 149.241.26.241
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13952 protocol: 6 streamName: meraki clientIP: 90.26.16.32 serverIP: 149.241.26.241
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=103.3.74.61 dst=177.110.12.15 protocol=tcp sport=43392 dport=25 pattern: 1 dst 177.110.12.15
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=103.3.74.61 dst=177.110.12.15 protocol=tcp sport=43392 dport=25 pattern: 1 dst 177.110.12.15", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43392, "protocol": 6, "streamName": "meraki", "clientIP": "103.3.74.61", "serverIP": "177.110.12.15" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=103.3.74.61 dst=177.110.12.15 protocol=tcp sport=43392 dport=25 pattern: 1 dst 177.110.12.15
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=103.3.74.61 dst=177.110.12.15 protocol=tcp sport=43392 dport=25 pattern: 1 dst 177.110.12.15
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43392 protocol: 6 streamName: meraki clientIP: 103.3.74.61 serverIP: 177.110.12.15
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=236.42.141.22 dst=80.157.120.199 protocol=tcp sport=43392 dport=25 pattern: 1 dst 80.157.120.199
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=236.42.141.22 dst=80.157.120.199 protocol=tcp sport=43392 dport=25 pattern: 1 dst 80.157.120.199", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 43392, "protocol": 6, "streamName": "meraki", "clientIP": "236.42.141.22", "serverIP": "80.157.120.199" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=236.42.141.22 dst=80.157.120.199 protocol=tcp sport=43392 dport=25 pattern: 1 dst 80.157.120.199
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.639324543 NORDC_MX400_1 flows src=236.42.141.22 dst=80.157.120.199 protocol=tcp sport=43392 dport=25 pattern: 1 dst 80.157.120.199
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 43392 protocol: 6 streamName: meraki clientIP: 236.42.141.22 serverIP: 80.157.120.199
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=121.247.119.247 dst=197.232.75.20 protocol=tcp sport=8216 dport=25 pattern: 1 dst 197.232.75.20
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=121.247.119.247 dst=197.232.75.20 protocol=tcp sport=8216 dport=25 pattern: 1 dst 197.232.75.20", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 8216, "protocol": 6, "streamName": "meraki", "clientIP": "121.247.119.247", "serverIP": "197.232.75.20" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=121.247.119.247 dst=197.232.75.20 protocol=tcp sport=8216 dport=25 pattern: 1 dst 197.232.75.20
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=121.247.119.247 dst=197.232.75.20 protocol=tcp sport=8216 dport=25 pattern: 1 dst 197.232.75.20
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 8216 protocol: 6 streamName: meraki clientIP: 121.247.119.247 serverIP: 197.232.75.20
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=94.201.254.163 dst=113.194.127.41 protocol=tcp sport=8216 dport=25 pattern: 1 dst 113.194.127.41
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=94.201.254.163 dst=113.194.127.41 protocol=tcp sport=8216 dport=25 pattern: 1 dst 113.194.127.41", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 8216, "protocol": 6, "streamName": "meraki", "clientIP": "94.201.254.163", "serverIP": "113.194.127.41" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=94.201.254.163 dst=113.194.127.41 protocol=tcp sport=8216 dport=25 pattern: 1 dst 113.194.127.41
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446276.522888522 NORDC_MX400_1 flows src=94.201.254.163 dst=113.194.127.41 protocol=tcp sport=8216 dport=25 pattern: 1 dst 113.194.127.41
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 8216 protocol: 6 streamName: meraki clientIP: 94.201.254.163 serverIP: 113.194.127.41
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=20.220.149.147 dst=127.71.71.25 protocol=tcp sport=25394 dport=25 pattern: 1 dst 127.71.71.25
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=20.220.149.147 dst=127.71.71.25 protocol=tcp sport=25394 dport=25 pattern: 1 dst 127.71.71.25", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 25394, "protocol": 6, "streamName": "meraki", "clientIP": "20.220.149.147", "serverIP": "127.71.71.25" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=20.220.149.147 dst=127.71.71.25 protocol=tcp sport=25394 dport=25 pattern: 1 dst 127.71.71.25
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=20.220.149.147 dst=127.71.71.25 protocol=tcp sport=25394 dport=25 pattern: 1 dst 127.71.71.25
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 25394 protocol: 6 streamName: meraki clientIP: 20.220.149.147 serverIP: 127.71.71.25
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=184.123.177.71 dst=83.215.68.56 protocol=tcp sport=25394 dport=25 pattern: 1 dst 83.215.68.56
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=184.123.177.71 dst=83.215.68.56 protocol=tcp sport=25394 dport=25 pattern: 1 dst 83.215.68.56", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 25394, "protocol": 6, "streamName": "meraki", "clientIP": "184.123.177.71", "serverIP": "83.215.68.56" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=184.123.177.71 dst=83.215.68.56 protocol=tcp sport=25394 dport=25 pattern: 1 dst 83.215.68.56
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661446277.297717923 NORDC_MX400_1 flows src=184.123.177.71 dst=83.215.68.56 protocol=tcp sport=25394 dport=25 pattern: 1 dst 83.215.68.56
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 25394 protocol: 6 streamName: meraki clientIP: 184.123.177.71 serverIP: 83.215.68.56
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=253.187.224.90 dst=214.62.227.32 protocol=tcp sport=5632 dport=25 pattern: 1 dst 214.62.227.32
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=253.187.224.90 dst=214.62.227.32 protocol=tcp sport=5632 dport=25 pattern: 1 dst 214.62.227.32", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5632, "protocol": 6, "streamName": "meraki", "clientIP": "253.187.224.90", "serverIP": "214.62.227.32" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=253.187.224.90 dst=214.62.227.32 protocol=tcp sport=5632 dport=25 pattern: 1 dst 214.62.227.32
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=253.187.224.90 dst=214.62.227.32 protocol=tcp sport=5632 dport=25 pattern: 1 dst 214.62.227.32
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5632 protocol: 6 streamName: meraki clientIP: 253.187.224.90 serverIP: 214.62.227.32
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=231.24.53.46 dst=146.48.76.138 protocol=tcp sport=5632 dport=25 pattern: 1 dst 146.48.76.138
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=231.24.53.46 dst=146.48.76.138 protocol=tcp sport=5632 dport=25 pattern: 1 dst 146.48.76.138", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5632, "protocol": 6, "streamName": "meraki", "clientIP": "231.24.53.46", "serverIP": "146.48.76.138" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=231.24.53.46 dst=146.48.76.138 protocol=tcp sport=5632 dport=25 pattern: 1 dst 146.48.76.138
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=231.24.53.46 dst=146.48.76.138 protocol=tcp sport=5632 dport=25 pattern: 1 dst 146.48.76.138
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5632 protocol: 6 streamName: meraki clientIP: 231.24.53.46 serverIP: 146.48.76.138
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=71.161.55.228 dst=255.242.92.234 protocol=tcp sport=5632 dport=25 pattern: 1 dst 255.242.92.234
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=71.161.55.228 dst=255.242.92.234 protocol=tcp sport=5632 dport=25 pattern: 1 dst 255.242.92.234", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5632, "protocol": 6, "streamName": "meraki", "clientIP": "71.161.55.228", "serverIP": "255.242.92.234" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=71.161.55.228 dst=255.242.92.234 protocol=tcp sport=5632 dport=25 pattern: 1 dst 255.242.92.234
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=71.161.55.228 dst=255.242.92.234 protocol=tcp sport=5632 dport=25 pattern: 1 dst 255.242.92.234
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5632 protocol: 6 streamName: meraki clientIP: 71.161.55.228 serverIP: 255.242.92.234
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=220.14.46.22 dst=166.109.99.236 protocol=tcp sport=5632 dport=25 pattern: 1 dst 166.109.99.236
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=220.14.46.22 dst=166.109.99.236 protocol=tcp sport=5632 dport=25 pattern: 1 dst 166.109.99.236", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5632, "protocol": 6, "streamName": "meraki", "clientIP": "220.14.46.22", "serverIP": "166.109.99.236" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=220.14.46.22 dst=166.109.99.236 protocol=tcp sport=5632 dport=25 pattern: 1 dst 166.109.99.236
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.791085808 NORDC_MX400_1 flows src=220.14.46.22 dst=166.109.99.236 protocol=tcp sport=5632 dport=25 pattern: 1 dst 166.109.99.236
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5632 protocol: 6 streamName: meraki clientIP: 220.14.46.22 serverIP: 166.109.99.236
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=45.16.246.119 dst=162.154.49.89 protocol=tcp sport=7121 dport=25 pattern: 1 dst 162.154.49.89
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=45.16.246.119 dst=162.154.49.89 protocol=tcp sport=7121 dport=25 pattern: 1 dst 162.154.49.89", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 7121, "protocol": 6, "streamName": "meraki", "clientIP": "45.16.246.119", "serverIP": "162.154.49.89" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=45.16.246.119 dst=162.154.49.89 protocol=tcp sport=7121 dport=25 pattern: 1 dst 162.154.49.89
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=45.16.246.119 dst=162.154.49.89 protocol=tcp sport=7121 dport=25 pattern: 1 dst 162.154.49.89
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 7121 protocol: 6 streamName: meraki clientIP: 45.16.246.119 serverIP: 162.154.49.89
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=69.47.90.35 dst=7.252.199.2 protocol=tcp sport=7121 dport=25 pattern: 1 dst 7.252.199.2
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=69.47.90.35 dst=7.252.199.2 protocol=tcp sport=7121 dport=25 pattern: 1 dst 7.252.199.2", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 7121, "protocol": 6, "streamName": "meraki", "clientIP": "69.47.90.35", "serverIP": "7.252.199.2" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=69.47.90.35 dst=7.252.199.2 protocol=tcp sport=7121 dport=25 pattern: 1 dst 7.252.199.2
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.966951094 NORDC_MX400_1 flows src=69.47.90.35 dst=7.252.199.2 protocol=tcp sport=7121 dport=25 pattern: 1 dst 7.252.199.2
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 7121 protocol: 6 streamName: meraki clientIP: 69.47.90.35 serverIP: 7.252.199.2
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=141.168.209.127 dst=74.135.23.82 protocol=tcp sport=52704 dport=25 pattern: 1 dst 74.135.23.82
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=141.168.209.127 dst=74.135.23.82 protocol=tcp sport=52704 dport=25 pattern: 1 dst 74.135.23.82", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52704, "protocol": 6, "streamName": "meraki", "clientIP": "141.168.209.127", "serverIP": "74.135.23.82" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=141.168.209.127 dst=74.135.23.82 protocol=tcp sport=52704 dport=25 pattern: 1 dst 74.135.23.82
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=141.168.209.127 dst=74.135.23.82 protocol=tcp sport=52704 dport=25 pattern: 1 dst 74.135.23.82
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52704 protocol: 6 streamName: meraki clientIP: 141.168.209.127 serverIP: 74.135.23.82
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=43.91.135.77 dst=252.244.150.159 protocol=tcp sport=52704 dport=25 pattern: 1 dst 252.244.150.159
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=43.91.135.77 dst=252.244.150.159 protocol=tcp sport=52704 dport=25 pattern: 1 dst 252.244.150.159", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 52704, "protocol": 6, "streamName": "meraki", "clientIP": "43.91.135.77", "serverIP": "252.244.150.159" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=43.91.135.77 dst=252.244.150.159 protocol=tcp sport=52704 dport=25 pattern: 1 dst 252.244.150.159
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1681042591.998906538 NORDC_MX400_1 flows src=43.91.135.77 dst=252.244.150.159 protocol=tcp sport=52704 dport=25 pattern: 1 dst 252.244.150.159
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 52704 protocol: 6 streamName: meraki clientIP: 43.91.135.77 serverIP: 252.244.150.159
Explain this syslog message
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=121.106.255.22 dst=169.154.84.129 protocol=tcp sport=8992 dport=25 pattern: 1 dst 169.154.84.129
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=121.106.255.22 dst=169.154.84.129 protocol=tcp sport=8992 dport=25 pattern: 1 dst 169.154.84.129", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 8992, "protocol": 6, "streamName": "meraki", "clientIP": "121.106.255.22", "serverIP": "169.154.84.129" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=121.106.255.22 dst=169.154.84.129 protocol=tcp sport=8992 dport=25 pattern: 1 dst 169.154.84.129
Product: Meraki Vendor: Cisco
Identify this syslog message