input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 25565,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54855,
"protocol": 6,
"streamName": "meraki",
"clientIP": "99.164.1.152",
"serverIP": "148.238.21.158"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25565
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54855
protocol: 6
streamName: meraki
clientIP: 99.164.1.152
serverIP: 148.238.21.158
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 25565,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54855,
"protocol": 6,
"streamName": "meraki",
"clientIP": "86.170.135.89",
"serverIP": "212.26.170.220"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25565
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54855
protocol: 6
streamName: meraki
clientIP: 86.170.135.89
serverIP: 212.26.170.220
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 25565,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54855,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.38.29.53",
"serverIP": "248.40.94.223"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25565
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54855
protocol: 6
streamName: meraki
clientIP: 172.38.29.53
serverIP: 248.40.94.223
|
Explain this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 25565,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54855,
"protocol": 6,
"streamName": "meraki",
"clientIP": "81.51.218.102",
"serverIP": "166.136.233.48"
}
|
Create a JSON artifact from the message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25565
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54855
protocol: 6
streamName: meraki
clientIP: 81.51.218.102
serverIP: 166.136.233.48
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30139,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "145.68.172.111",
"serverIP": "225.148.83.61"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30139
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 145.68.172.111
serverIP: 225.148.83.61
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30139,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "114.251.127.63",
"serverIP": "74.114.26.203"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30139
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 114.251.127.63
serverIP: 74.114.26.203
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30139,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "203.41.163.208",
"serverIP": "43.5.52.0"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30139
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 203.41.163.208
serverIP: 43.5.52.0
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 30139,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "189.224.127.16",
"serverIP": "175.119.253.55"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30139
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 189.224.127.16
serverIP: 175.119.253.55
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57009,
"protocol": 17,
"streamName": "meraki",
"clientIP": "167.78.151.180",
"serverIP": "80.90.255.64"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57009
protocol: 17
streamName: meraki
clientIP: 167.78.151.180
serverIP: 80.90.255.64
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57009,
"protocol": 17,
"streamName": "meraki",
"clientIP": "182.254.151.247",
"serverIP": "199.72.222.71"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57009
protocol: 17
streamName: meraki
clientIP: 182.254.151.247
serverIP: 199.72.222.71
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57009,
"protocol": 17,
"streamName": "meraki",
"clientIP": "75.89.147.91",
"serverIP": "157.239.210.105"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57009
protocol: 17
streamName: meraki
clientIP: 75.89.147.91
serverIP: 157.239.210.105
|
Explain this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57009,
"protocol": 17,
"streamName": "meraki",
"clientIP": "148.197.181.55",
"serverIP": "244.50.246.197"
}
|
Create a JSON artifact from the message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57009
protocol: 17
streamName: meraki
clientIP: 148.197.181.55
serverIP: 244.50.246.197
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54738,
"protocol": 6,
"streamName": "meraki",
"clientIP": "190.232.162.230",
"serverIP": "223.90.49.144"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54738
protocol: 6
streamName: meraki
clientIP: 190.232.162.230
serverIP: 223.90.49.144
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54738,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.103.72.48",
"serverIP": "150.158.185.152"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54738
protocol: 6
streamName: meraki
clientIP: 78.103.72.48
serverIP: 150.158.185.152
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54738,
"protocol": 6,
"streamName": "meraki",
"clientIP": "166.66.213.175",
"serverIP": "107.157.184.73"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54738
protocol: 6
streamName: meraki
clientIP: 166.66.213.175
serverIP: 107.157.184.73
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54738,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.97.43.163",
"serverIP": "72.46.132.217"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54738
protocol: 6
streamName: meraki
clientIP: 36.97.43.163
serverIP: 72.46.132.217
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29870,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "203.91.225.244",
"serverIP": "75.32.213.56"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29870
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 203.91.225.244
serverIP: 75.32.213.56
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29870,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "76.137.95.137",
"serverIP": "27.23.126.82"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29870
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 76.137.95.137
serverIP: 27.23.126.82
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29870,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "92.99.233.243",
"serverIP": "146.53.197.183"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29870
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 92.99.233.243
serverIP: 146.53.197.183
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 29870,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56901,
"protocol": 6,
"streamName": "meraki",
"clientIP": "136.168.208.183",
"serverIP": "87.230.153.160"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 29870
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56901
protocol: 6
streamName: meraki
clientIP: 136.168.208.183
serverIP: 87.230.153.160
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.225.3.141",
"serverIP": "71.255.11.68"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51717
protocol: 6
streamName: meraki
clientIP: 125.225.3.141
serverIP: 71.255.11.68
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "86.165.80.235",
"serverIP": "108.66.172.162"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51717
protocol: 6
streamName: meraki
clientIP: 86.165.80.235
serverIP: 108.66.172.162
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6250,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.138.132.241",
"serverIP": "48.1.193.135"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6250
protocol: 6
streamName: meraki
clientIP: 10.138.132.241
serverIP: 48.1.193.135
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6250,
"protocol": 6,
"streamName": "meraki",
"clientIP": "4.84.104.90",
"serverIP": "230.103.172.75"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6250
protocol: 6
streamName: meraki
clientIP: 4.84.104.90
serverIP: 230.103.172.75
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63122,
"protocol": 6,
"streamName": "meraki",
"clientIP": "141.48.201.74",
"serverIP": "223.221.109.194"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63122
protocol: 6
streamName: meraki
clientIP: 141.48.201.74
serverIP: 223.221.109.194
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63122,
"protocol": 6,
"streamName": "meraki",
"clientIP": "187.32.100.253",
"serverIP": "134.28.127.18"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63122
protocol: 6
streamName: meraki
clientIP: 187.32.100.253
serverIP: 134.28.127.18
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "181.35.198.78",
"serverIP": "237.50.55.35"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6253
protocol: 6
streamName: meraki
clientIP: 181.35.198.78
serverIP: 237.50.55.35
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.13.18.99",
"serverIP": "59.177.65.21"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6253
protocol: 6
streamName: meraki
clientIP: 32.13.18.99
serverIP: 59.177.65.21
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53344,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.45.102.126",
"serverIP": "7.184.93.26"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53344
protocol: 6
streamName: meraki
clientIP: 125.45.102.126
serverIP: 7.184.93.26
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53344,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.6.121.76",
"serverIP": "238.50.195.108"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53344
protocol: 6
streamName: meraki
clientIP: 90.6.121.76
serverIP: 238.50.195.108
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "126.51.83.227",
"serverIP": "191.195.169.135"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51717
protocol: 6
streamName: meraki
clientIP: 126.51.83.227
serverIP: 191.195.169.135
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "73.41.106.71",
"serverIP": "222.82.92.255"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51717
protocol: 6
streamName: meraki
clientIP: 73.41.106.71
serverIP: 222.82.92.255
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
|
{
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "100.137.225.190",
"serverIP": "84.17.3.110"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 100.137.225.190
serverIP: 84.17.3.110
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
|
{
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "12.177.150.84",
"serverIP": "28.216.123.100"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.