input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=10.155.159.167 dst=208.241.163.125 protocol=udp sport=60362 dport=161 pattern: 1 dst 208.241.163.125
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 161 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60362 protocol: 17 streamName: meraki clientIP: 10.155.159.167 serverIP: 208.241.163.125
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
{ "senderhost": "192.168.2.250", "serverport": 161, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60362, "protocol": 17, "streamName": "meraki", "clientIP": "192.95.29.18", "serverIP": "10.116.251.180" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 161 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60362 protocol: 17 streamName: meraki clientIP: 192.95.29.18 serverIP: 10.116.251.180
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
{ "senderhost": "192.168.2.250", "serverport": 161, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60362, "protocol": 17, "streamName": "meraki", "clientIP": "231.79.57.89", "serverIP": "220.106.222.203" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 161 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60362 protocol: 17 streamName: meraki clientIP: 231.79.57.89 serverIP: 220.106.222.203
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
{ "senderhost": "192.168.2.250", "serverport": 161, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60362, "protocol": 17, "streamName": "meraki", "clientIP": "39.149.83.17", "serverIP": "3.83.97.160" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 161 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60362 protocol: 17 streamName: meraki clientIP: 39.149.83.17 serverIP: 3.83.97.160
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "72.91.10.249", "serverIP": "202.105.207.187" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 72.91.10.249 serverIP: 202.105.207.187
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "43.54.44.110", "serverIP": "169.140.202.57" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 43.54.44.110 serverIP: 169.140.202.57
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "109.185.70.94", "serverIP": "158.194.152.20" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 109.185.70.94 serverIP: 158.194.152.20
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "93.235.88.115", "serverIP": "186.230.3.17" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 93.235.88.115 serverIP: 186.230.3.17
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "231.151.80.33", "serverIP": "249.102.129.200" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 231.151.80.33 serverIP: 249.102.129.200
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "194.12.202.221", "serverIP": "31.122.215.42" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 194.12.202.221 serverIP: 31.122.215.42
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "193.180.62.78", "serverIP": "46.163.94.39" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 193.180.62.78 serverIP: 46.163.94.39
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "75.233.40.26", "serverIP": "60.35.50.241" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 75.233.40.26 serverIP: 60.35.50.241
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "85.185.207.207", "serverIP": "172.196.140.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 85.185.207.207 serverIP: 172.196.140.135
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "63.54.109.71", "serverIP": "241.27.251.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 63.54.109.71 serverIP: 241.27.251.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "251.133.26.62", "serverIP": "104.194.59.45" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 251.133.26.62 serverIP: 104.194.59.45
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "78.95.76.75", "serverIP": "158.146.116.63" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 78.95.76.75 serverIP: 158.146.116.63
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "40.240.154.144", "serverIP": "205.30.74.132" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 40.240.154.144 serverIP: 205.30.74.132
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "44.18.119.241", "serverIP": "43.64.126.136" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 44.18.119.241 serverIP: 43.64.126.136
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "21.211.215.164", "serverIP": "193.17.138.184" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 21.211.215.164 serverIP: 193.17.138.184
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "130.213.18.255", "serverIP": "125.4.164.211" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 130.213.18.255 serverIP: 125.4.164.211
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "160.126.191.143", "serverIP": "14.207.119.136" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 160.126.191.143 serverIP: 14.207.119.136
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5060, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5090, "protocol": 17, "streamName": "meraki", "clientIP": "237.58.198.239", "serverIP": "132.244.66.233" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5060 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5090 protocol: 17 streamName: meraki clientIP: 237.58.198.239 serverIP: 132.244.66.233
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29670, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56974, "protocol": 6, "streamName": "meraki", "clientIP": "138.18.115.158", "serverIP": "104.181.89.246" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29670 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56974 protocol: 6 streamName: meraki clientIP: 138.18.115.158 serverIP: 104.181.89.246
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29670, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56974, "protocol": 6, "streamName": "meraki", "clientIP": "122.37.24.17", "serverIP": "117.222.149.164" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29670 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56974 protocol: 6 streamName: meraki clientIP: 122.37.24.17 serverIP: 117.222.149.164
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29670, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56974, "protocol": 6, "streamName": "meraki", "clientIP": "50.165.40.19", "serverIP": "137.97.158.139" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29670 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56974 protocol: 6 streamName: meraki clientIP: 50.165.40.19 serverIP: 137.97.158.139
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29670, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56974, "protocol": 6, "streamName": "meraki", "clientIP": "14.100.172.92", "serverIP": "29.192.224.138" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29670 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56974 protocol: 6 streamName: meraki clientIP: 14.100.172.92 serverIP: 29.192.224.138
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30219, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "24.195.167.96", "serverIP": "192.62.65.100" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30219 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 24.195.167.96 serverIP: 192.62.65.100
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30219, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "230.234.148.64", "serverIP": "57.81.188.151" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30219 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 230.234.148.64 serverIP: 57.81.188.151
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30219, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "158.30.127.107", "serverIP": "198.160.38.250" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30219 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 158.30.127.107 serverIP: 198.160.38.250
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30219, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "167.198.161.191", "serverIP": "72.247.236.17" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30219 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 167.198.161.191 serverIP: 72.247.236.17
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 47969, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50015, "protocol": 6, "streamName": "meraki", "clientIP": "35.193.199.60", "serverIP": "140.201.65.253" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 47969 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50015 protocol: 6 streamName: meraki clientIP: 35.193.199.60 serverIP: 140.201.65.253
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 47969, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50015, "protocol": 6, "streamName": "meraki", "clientIP": "25.81.92.181", "serverIP": "165.105.169.127" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 47969 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50015 protocol: 6 streamName: meraki clientIP: 25.81.92.181 serverIP: 165.105.169.127
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 47969, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50015, "protocol": 6, "streamName": "meraki", "clientIP": "144.105.244.127", "serverIP": "185.84.36.67" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 47969 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50015 protocol: 6 streamName: meraki clientIP: 144.105.244.127 serverIP: 185.84.36.67
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 47969, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50015, "protocol": 6, "streamName": "meraki", "clientIP": "53.242.193.188", "serverIP": "28.132.172.183" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 47969 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50015 protocol: 6 streamName: meraki clientIP: 53.242.193.188 serverIP: 28.132.172.183
Explain this syslog message