input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=10.155.159.167 dst=208.241.163.125 protocol=udp sport=60362 dport=161 pattern: 1 dst 208.241.163.125
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60362
protocol: 17
streamName: meraki
clientIP: 10.155.159.167
serverIP: 208.241.163.125
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
|
{
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60362,
"protocol": 17,
"streamName": "meraki",
"clientIP": "192.95.29.18",
"serverIP": "10.116.251.180"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=192.95.29.18 dst=10.116.251.180 protocol=udp sport=60362 dport=161 pattern: 1 dst 10.116.251.180
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60362
protocol: 17
streamName: meraki
clientIP: 192.95.29.18
serverIP: 10.116.251.180
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
|
{
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60362,
"protocol": 17,
"streamName": "meraki",
"clientIP": "231.79.57.89",
"serverIP": "220.106.222.203"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=231.79.57.89 dst=220.106.222.203 protocol=udp sport=60362 dport=161 pattern: 1 dst 220.106.222.203
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60362
protocol: 17
streamName: meraki
clientIP: 231.79.57.89
serverIP: 220.106.222.203
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
|
{
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60362,
"protocol": 17,
"streamName": "meraki",
"clientIP": "39.149.83.17",
"serverIP": "3.83.97.160"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=39.149.83.17 dst=3.83.97.160 protocol=udp sport=60362 dport=161 pattern: 1 dst 3.83.97.160
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60362
protocol: 17
streamName: meraki
clientIP: 39.149.83.17
serverIP: 3.83.97.160
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "72.91.10.249",
"serverIP": "202.105.207.187"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=72.91.10.249 dst=202.105.207.187 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 72.91.10.249
serverIP: 202.105.207.187
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "43.54.44.110",
"serverIP": "169.140.202.57"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=43.54.44.110 dst=169.140.202.57 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 43.54.44.110
serverIP: 169.140.202.57
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "109.185.70.94",
"serverIP": "158.194.152.20"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=109.185.70.94 dst=158.194.152.20 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 109.185.70.94
serverIP: 158.194.152.20
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "93.235.88.115",
"serverIP": "186.230.3.17"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=93.235.88.115 dst=186.230.3.17 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 93.235.88.115
serverIP: 186.230.3.17
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "231.151.80.33",
"serverIP": "249.102.129.200"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=231.151.80.33 dst=249.102.129.200 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 231.151.80.33
serverIP: 249.102.129.200
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "194.12.202.221",
"serverIP": "31.122.215.42"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=194.12.202.221 dst=31.122.215.42 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 194.12.202.221
serverIP: 31.122.215.42
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "193.180.62.78",
"serverIP": "46.163.94.39"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=193.180.62.78 dst=46.163.94.39 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 193.180.62.78
serverIP: 46.163.94.39
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "75.233.40.26",
"serverIP": "60.35.50.241"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=75.233.40.26 dst=60.35.50.241 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 75.233.40.26
serverIP: 60.35.50.241
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "85.185.207.207",
"serverIP": "172.196.140.135"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=85.185.207.207 dst=172.196.140.135 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 85.185.207.207
serverIP: 172.196.140.135
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "63.54.109.71",
"serverIP": "241.27.251.255"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144612456 NORDC_MX400_1 flows src=63.54.109.71 dst=241.27.251.255 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 63.54.109.71
serverIP: 241.27.251.255
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "251.133.26.62",
"serverIP": "104.194.59.45"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=251.133.26.62 dst=104.194.59.45 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 251.133.26.62
serverIP: 104.194.59.45
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "78.95.76.75",
"serverIP": "158.146.116.63"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144456188 NORDC_MX400_1 flows src=78.95.76.75 dst=158.146.116.63 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 78.95.76.75
serverIP: 158.146.116.63
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "40.240.154.144",
"serverIP": "205.30.74.132"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=40.240.154.144 dst=205.30.74.132 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 40.240.154.144
serverIP: 205.30.74.132
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "44.18.119.241",
"serverIP": "43.64.126.136"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.144826357 NORDC_MX400_1 flows src=44.18.119.241 dst=43.64.126.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 44.18.119.241
serverIP: 43.64.126.136
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "21.211.215.164",
"serverIP": "193.17.138.184"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=21.211.215.164 dst=193.17.138.184 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 21.211.215.164
serverIP: 193.17.138.184
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "130.213.18.255",
"serverIP": "125.4.164.211"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.147382068 NORDC_MX400_1 flows src=130.213.18.255 dst=125.4.164.211 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 130.213.18.255
serverIP: 125.4.164.211
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "160.126.191.143",
"serverIP": "14.207.119.136"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=160.126.191.143 dst=14.207.119.136 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 160.126.191.143
serverIP: 14.207.119.136
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "237.58.198.239",
"serverIP": "132.244.66.233"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660778871.143815717 NORDC_MX400_1 flows src=237.58.198.239 dst=132.244.66.233 protocol=udp sport=5090 dport=5060 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 237.58.198.239
serverIP: 132.244.66.233
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29670,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "138.18.115.158",
"serverIP": "104.181.89.246"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=138.18.115.158 dst=104.181.89.246 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29670
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56974
protocol: 6
streamName: meraki
clientIP: 138.18.115.158
serverIP: 104.181.89.246
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29670,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "122.37.24.17",
"serverIP": "117.222.149.164"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=122.37.24.17 dst=117.222.149.164 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29670
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56974
protocol: 6
streamName: meraki
clientIP: 122.37.24.17
serverIP: 117.222.149.164
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29670,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "50.165.40.19",
"serverIP": "137.97.158.139"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=50.165.40.19 dst=137.97.158.139 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29670
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56974
protocol: 6
streamName: meraki
clientIP: 50.165.40.19
serverIP: 137.97.158.139
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29670,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56974,
"protocol": 6,
"streamName": "meraki",
"clientIP": "14.100.172.92",
"serverIP": "29.192.224.138"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660775265.636698715 NORDC_MX400_1 flows src=14.100.172.92 dst=29.192.224.138 protocol=tcp sport=56974 dport=29670 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29670
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56974
protocol: 6
streamName: meraki
clientIP: 14.100.172.92
serverIP: 29.192.224.138
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30219,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "24.195.167.96",
"serverIP": "192.62.65.100"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=24.195.167.96 dst=192.62.65.100 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30219
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 24.195.167.96
serverIP: 192.62.65.100
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30219,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "230.234.148.64",
"serverIP": "57.81.188.151"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=230.234.148.64 dst=57.81.188.151 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30219
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 230.234.148.64
serverIP: 57.81.188.151
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30219,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.30.127.107",
"serverIP": "198.160.38.250"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=158.30.127.107 dst=198.160.38.250 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30219
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 158.30.127.107
serverIP: 198.160.38.250
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30219,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "167.198.161.191",
"serverIP": "72.247.236.17"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660745576.152842226 M38_MX67C_Conyers flows src=167.198.161.191 dst=72.247.236.17 protocol=tcp sport=56901 dport=30219 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30219
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 167.198.161.191
serverIP: 72.247.236.17
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 47969,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50015,
"protocol": 6,
"streamName": "meraki",
"clientIP": "35.193.199.60",
"serverIP": "140.201.65.253"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=140.201.65.253 dst=35.193.199.60 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 47969
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50015
protocol: 6
streamName: meraki
clientIP: 35.193.199.60
serverIP: 140.201.65.253
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 47969,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50015,
"protocol": 6,
"streamName": "meraki",
"clientIP": "25.81.92.181",
"serverIP": "165.105.169.127"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=165.105.169.127 dst=25.81.92.181 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 47969
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50015
protocol: 6
streamName: meraki
clientIP: 25.81.92.181
serverIP: 165.105.169.127
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 47969,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50015,
"protocol": 6,
"streamName": "meraki",
"clientIP": "144.105.244.127",
"serverIP": "185.84.36.67"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=185.84.36.67 dst=144.105.244.127 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 47969
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50015
protocol: 6
streamName: meraki
clientIP: 144.105.244.127
serverIP: 185.84.36.67
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 47969,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50015,
"protocol": 6,
"streamName": "meraki",
"clientIP": "53.242.193.188",
"serverIP": "28.132.172.183"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660772526.660114778 M38_MX67C_Conyers flows src=28.132.172.183 dst=53.242.193.188 protocol=tcp sport=47969 dport=50015 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 47969
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50015
protocol: 6
streamName: meraki
clientIP: 53.242.193.188
serverIP: 28.132.172.183
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.